General
-
Target
2025-01-09_2f456c1f1267cceeb4ca4f4d004942be_avoslocker_cobalt-strike_floxif_luca-stealer
-
Size
665KB
-
Sample
250109-v4qjksxqaq
-
MD5
2f456c1f1267cceeb4ca4f4d004942be
-
SHA1
a41a8f3d2f28590a4329251a8254aaea1c2409b7
-
SHA256
c7f993e06be4b4f40e3aa21f9abeef42266587cb292ba3e77e8ff401f79b5326
-
SHA512
3806f27859a6d4c600fa1ce5fea41329d64dfa3200a1f927184089b12e54acab8ab8fa3ac8f7a74e6ed41780e62793aa3cc5682a00692e6d5ab3f7e122611fff
-
SSDEEP
12288:XubXcqafJcLdBQwnVWqqPIBONhxsU/EbBjvrEH7Qk:XurJ9Er/xsU/EhrEH7P
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-09_2f456c1f1267cceeb4ca4f4d004942be_avoslocker_cobalt-strike_floxif_luca-stealer.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-01-09_2f456c1f1267cceeb4ca4f4d004942be_avoslocker_cobalt-strike_floxif_luca-stealer
-
Size
665KB
-
MD5
2f456c1f1267cceeb4ca4f4d004942be
-
SHA1
a41a8f3d2f28590a4329251a8254aaea1c2409b7
-
SHA256
c7f993e06be4b4f40e3aa21f9abeef42266587cb292ba3e77e8ff401f79b5326
-
SHA512
3806f27859a6d4c600fa1ce5fea41329d64dfa3200a1f927184089b12e54acab8ab8fa3ac8f7a74e6ed41780e62793aa3cc5682a00692e6d5ab3f7e122611fff
-
SSDEEP
12288:XubXcqafJcLdBQwnVWqqPIBONhxsU/EbBjvrEH7Qk:XurJ9Er/xsU/EhrEH7P
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-