General
-
Target
2025-01-09_df24113dc443dd4b0d5ff1da0921bac6_avoslocker_cobalt-strike_floxif_luca-stealer
-
Size
665KB
-
Sample
250109-wjdvqawnfs
-
MD5
df24113dc443dd4b0d5ff1da0921bac6
-
SHA1
2e1eb7dca17144d92aa5ec3d1eea7e9641871c13
-
SHA256
22bcff79e8597817481c8679f8368a2bb26e43c3477338d0550914995eb18f09
-
SHA512
eb76a1638d0ccb620bc17c43157b9146cd92b1e1c0446bfa582d033a904453eff4f556f16ba39a3b72516f79bb3307250ed59474d26e09940b004b609c138af7
-
SSDEEP
12288:XubXbhafJcLln5QwnVWqqPIBONhxsU/EbBjvrEH7u:Xurd90r/xsU/EhrEH7u
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-09_df24113dc443dd4b0d5ff1da0921bac6_avoslocker_cobalt-strike_floxif_luca-stealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-09_df24113dc443dd4b0d5ff1da0921bac6_avoslocker_cobalt-strike_floxif_luca-stealer.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2025-01-09_df24113dc443dd4b0d5ff1da0921bac6_avoslocker_cobalt-strike_floxif_luca-stealer
-
Size
665KB
-
MD5
df24113dc443dd4b0d5ff1da0921bac6
-
SHA1
2e1eb7dca17144d92aa5ec3d1eea7e9641871c13
-
SHA256
22bcff79e8597817481c8679f8368a2bb26e43c3477338d0550914995eb18f09
-
SHA512
eb76a1638d0ccb620bc17c43157b9146cd92b1e1c0446bfa582d033a904453eff4f556f16ba39a3b72516f79bb3307250ed59474d26e09940b004b609c138af7
-
SSDEEP
12288:XubXbhafJcLln5QwnVWqqPIBONhxsU/EbBjvrEH7u:Xurd90r/xsU/EhrEH7u
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-