General
-
Target
2025-01-10_586397c478a21930882ff94d231131c9_avoslocker_cobalt-strike_floxif_luca-stealer
-
Size
224KB
-
Sample
250110-b6e13szmak
-
MD5
586397c478a21930882ff94d231131c9
-
SHA1
d0953442f56901a333655fc6509b4d6d70aa884c
-
SHA256
fb68f62193476738522753530f7b400fc7888aca757f33125ab42f0a5547ad0c
-
SHA512
bfb30e202ba8bde34ea1ca0d130153f9a7f7aa0bc2224c2a92026972a65de13b30fc8460f7ad6a5a4eabc46c6a8d4784c5564060c61b41fae78060c8fae3cbcf
-
SSDEEP
6144:ayd2zi7ajvRcGNfw9hH4JdBV+UdvrEFp7hKxhd:ayd2zi+jv7I9hH4JdBjvrEH7a
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-10_586397c478a21930882ff94d231131c9_avoslocker_cobalt-strike_floxif_luca-stealer.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-01-10_586397c478a21930882ff94d231131c9_avoslocker_cobalt-strike_floxif_luca-stealer
-
Size
224KB
-
MD5
586397c478a21930882ff94d231131c9
-
SHA1
d0953442f56901a333655fc6509b4d6d70aa884c
-
SHA256
fb68f62193476738522753530f7b400fc7888aca757f33125ab42f0a5547ad0c
-
SHA512
bfb30e202ba8bde34ea1ca0d130153f9a7f7aa0bc2224c2a92026972a65de13b30fc8460f7ad6a5a4eabc46c6a8d4784c5564060c61b41fae78060c8fae3cbcf
-
SSDEEP
6144:ayd2zi7ajvRcGNfw9hH4JdBV+UdvrEFp7hKxhd:ayd2zi+jv7I9hH4JdBjvrEH7a
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-