General
-
Target
2025-01-28_3671d6a9ca42f394c235d6ef8ae4a071_avoslocker_cobalt-strike_floxif
-
Size
461KB
-
Sample
250128-caewwatjat
-
MD5
3671d6a9ca42f394c235d6ef8ae4a071
-
SHA1
f2efbef6b83bebdb8af7e44fcaa0a99169d14439
-
SHA256
636636122ced4a0845c494c482abb6ad7c3b7b1bda46a66ae41f723cee3a4600
-
SHA512
c4176a1562490a63b513c48d10a8d5026c649576aa6fc7d6175730715d595c4f52604b4396bcf9714ce545ad82af44739cbd90ba01524dca8615812c1ba7aaa0
-
SSDEEP
12288:SJRL3UmCb6U38Y9de3ANbCS0Z8MfsVdxenVWqqPIBONhxs8hmhSBjvrEH7QK:SJRL3Qp9dNNbCiMfsVf1/xs8hmCrEH7F
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-28_3671d6a9ca42f394c235d6ef8ae4a071_avoslocker_cobalt-strike_floxif.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2025-01-28_3671d6a9ca42f394c235d6ef8ae4a071_avoslocker_cobalt-strike_floxif.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2025-01-28_3671d6a9ca42f394c235d6ef8ae4a071_avoslocker_cobalt-strike_floxif
-
Size
461KB
-
MD5
3671d6a9ca42f394c235d6ef8ae4a071
-
SHA1
f2efbef6b83bebdb8af7e44fcaa0a99169d14439
-
SHA256
636636122ced4a0845c494c482abb6ad7c3b7b1bda46a66ae41f723cee3a4600
-
SHA512
c4176a1562490a63b513c48d10a8d5026c649576aa6fc7d6175730715d595c4f52604b4396bcf9714ce545ad82af44739cbd90ba01524dca8615812c1ba7aaa0
-
SSDEEP
12288:SJRL3UmCb6U38Y9de3ANbCS0Z8MfsVdxenVWqqPIBONhxs8hmhSBjvrEH7QK:SJRL3Qp9dNNbCiMfsVf1/xs8hmCrEH7F
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-