General
-
Target
2025-01-24_1cf92f773f34f1113091665973094816_avoslocker_cobalt-strike_floxif_luca-stealer
-
Size
378KB
-
Sample
250124-dzjrssylfn
-
MD5
1cf92f773f34f1113091665973094816
-
SHA1
4d23227e2f8c2f110779cd45a5490889974faf62
-
SHA256
6c4fab27061e7f3915f85abebe373657a0d3b61c47cbd7090d47ef924c634a48
-
SHA512
a0cf0216df80d41f5887c62ea80423b3faf841708f26664f9521f2a2e9c3970ac23a009ac2662f2db7e21d4f3987d6aa8a75de5cc8a8a996fe739ed4fb8086f6
-
SSDEEP
6144:2YT6VSeL+8+PWfsq/iL+Q8vKU8QII7QEyahGqSVrkKE2A+ZDblF9LUPflGBV+Ud6:2k6cd7PKsq658vKBTI7QEyagqqDRF9L4
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-24_1cf92f773f34f1113091665973094816_avoslocker_cobalt-strike_floxif_luca-stealer.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
2025-01-24_1cf92f773f34f1113091665973094816_avoslocker_cobalt-strike_floxif_luca-stealer
-
Size
378KB
-
MD5
1cf92f773f34f1113091665973094816
-
SHA1
4d23227e2f8c2f110779cd45a5490889974faf62
-
SHA256
6c4fab27061e7f3915f85abebe373657a0d3b61c47cbd7090d47ef924c634a48
-
SHA512
a0cf0216df80d41f5887c62ea80423b3faf841708f26664f9521f2a2e9c3970ac23a009ac2662f2db7e21d4f3987d6aa8a75de5cc8a8a996fe739ed4fb8086f6
-
SSDEEP
6144:2YT6VSeL+8+PWfsq/iL+Q8vKU8QII7QEyahGqSVrkKE2A+ZDblF9LUPflGBV+Ud6:2k6cd7PKsq658vKBTI7QEyagqqDRF9L4
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-