General
-
Target
2025-02-08_097545208cb66bd108863332543b9146_avoslocker_cobalt-strike_floxif_luca-stealer
-
Size
954KB
-
Sample
250208-qmgswsymdm
-
MD5
097545208cb66bd108863332543b9146
-
SHA1
b368b88b261fedc7446ab7502809dbc3fb032b7e
-
SHA256
a2cbb77f004368fc20ea46eede24d21d5ce9be1f7e4176318a905559972e8a56
-
SHA512
d546259e5890bed956c2eb0a8c66451b33ef76a1cb29890f65f22ba95def7da8b6860463706bd6c23fcca693006736628fdaa394bbd144d8edb292ced1812032
-
SSDEEP
24576:HEcD+BNDpLiYYdWxJfSjtn1VnfNdS3ACSmF1vhD3ojrEH7+:HEX9iYI9E3ACSmF1v5oX
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-08_097545208cb66bd108863332543b9146_avoslocker_cobalt-strike_floxif_luca-stealer.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
2025-02-08_097545208cb66bd108863332543b9146_avoslocker_cobalt-strike_floxif_luca-stealer
-
Size
954KB
-
MD5
097545208cb66bd108863332543b9146
-
SHA1
b368b88b261fedc7446ab7502809dbc3fb032b7e
-
SHA256
a2cbb77f004368fc20ea46eede24d21d5ce9be1f7e4176318a905559972e8a56
-
SHA512
d546259e5890bed956c2eb0a8c66451b33ef76a1cb29890f65f22ba95def7da8b6860463706bd6c23fcca693006736628fdaa394bbd144d8edb292ced1812032
-
SSDEEP
24576:HEcD+BNDpLiYYdWxJfSjtn1VnfNdS3ACSmF1vhD3ojrEH7+:HEX9iYI9E3ACSmF1v5oX
-
Floxif family
-
Detects Floxif payload
-
Downloads MZ/PE file
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-