General
-
Target
2025-01-25_27b2027f92ca66969c3f2449010aba5c_avoslocker_cobalt-strike_luca-stealer
-
Size
270KB
-
Sample
250125-bkseaazjbk
-
MD5
27b2027f92ca66969c3f2449010aba5c
-
SHA1
f4fc8e43ad5d15c3781c7b0812a3663d55c98643
-
SHA256
eca457c7e9258b7526c10dda70afb96f7af73718c19c4ede894cc40e56af77fa
-
SHA512
98c6b55170cedc5b1d27cc8775b1d2acd023d20956767bfe3b96cbe88ceb56abe042d575b66539fe7fb11aa43cf5978a3ce66b60534bb638468fbff4692a4689
-
SSDEEP
6144:tDOnyhORl/hfUStnsjngPq+Ar32coTinSReWYfpuyt4pxdmqxFB:tDIyhORl/pUSNsjngPMr3JoTimYfpuyE
Behavioral task
behavioral1
Sample
2025-01-25_27b2027f92ca66969c3f2449010aba5c_avoslocker_cobalt-strike_luca-stealer.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-01-25_27b2027f92ca66969c3f2449010aba5c_avoslocker_cobalt-strike_luca-stealer
-
Size
270KB
-
MD5
27b2027f92ca66969c3f2449010aba5c
-
SHA1
f4fc8e43ad5d15c3781c7b0812a3663d55c98643
-
SHA256
eca457c7e9258b7526c10dda70afb96f7af73718c19c4ede894cc40e56af77fa
-
SHA512
98c6b55170cedc5b1d27cc8775b1d2acd023d20956767bfe3b96cbe88ceb56abe042d575b66539fe7fb11aa43cf5978a3ce66b60534bb638468fbff4692a4689
-
SSDEEP
6144:tDOnyhORl/hfUStnsjngPq+Ar32coTinSReWYfpuyt4pxdmqxFB:tDIyhORl/pUSNsjngPMr3JoTimYfpuyE
-
Deletes itself
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-