General

  • Target

    2025-01-09_2f456c1f1267cceeb4ca4f4d004942be_avoslocker_cobalt-strike_floxif_luca-stealer

  • Size

    665KB

  • Sample

    250109-v4qjksxqaq

  • MD5

    2f456c1f1267cceeb4ca4f4d004942be

  • SHA1

    a41a8f3d2f28590a4329251a8254aaea1c2409b7

  • SHA256

    c7f993e06be4b4f40e3aa21f9abeef42266587cb292ba3e77e8ff401f79b5326

  • SHA512

    3806f27859a6d4c600fa1ce5fea41329d64dfa3200a1f927184089b12e54acab8ab8fa3ac8f7a74e6ed41780e62793aa3cc5682a00692e6d5ab3f7e122611fff

  • SSDEEP

    12288:XubXcqafJcLdBQwnVWqqPIBONhxsU/EbBjvrEH7Qk:XurJ9Er/xsU/EhrEH7P

Malware Config

Targets

    • Target

      2025-01-09_2f456c1f1267cceeb4ca4f4d004942be_avoslocker_cobalt-strike_floxif_luca-stealer

    • Size

      665KB

    • MD5

      2f456c1f1267cceeb4ca4f4d004942be

    • SHA1

      a41a8f3d2f28590a4329251a8254aaea1c2409b7

    • SHA256

      c7f993e06be4b4f40e3aa21f9abeef42266587cb292ba3e77e8ff401f79b5326

    • SHA512

      3806f27859a6d4c600fa1ce5fea41329d64dfa3200a1f927184089b12e54acab8ab8fa3ac8f7a74e6ed41780e62793aa3cc5682a00692e6d5ab3f7e122611fff

    • SSDEEP

      12288:XubXcqafJcLdBQwnVWqqPIBONhxsU/EbBjvrEH7Qk:XurJ9Er/xsU/EhrEH7P

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks