General
-
Target
2025-04-03_7a79ac324cb4133629843c76e0ac166f_black-basta_cobalt-strike_floxif_hijackloader_luca-stealer
-
Size
208KB
-
Sample
250403-3v33bayps2
-
MD5
7a79ac324cb4133629843c76e0ac166f
-
SHA1
6ff96bc50b15b5537b71d28297ee87db8d6bf0cc
-
SHA256
b355d65d881b540714d0eaabb3695c529e8c7726061b7ebcd7baa4b3d5a1abcf
-
SHA512
0f91307e64ed3c9e538ce9c9498b556a5d4bbb73343908ac4da6597ec3d56a40efb16b7ce5377ee8b36eb13f819b4633a3444f39370f56dfbe960ed04cf8a69e
-
SSDEEP
3072:EH0PD+CWh5lO6ZflUgNtpARctyz1zs87IgEt/+Z3j2lQBV+UdE+rECWp7hKJ/R:ESD+zXffegxAF+gNBV+UdvrEFp7hKJZ
Static task
static1
Malware Config
Targets
-
-
Target
2025-04-03_7a79ac324cb4133629843c76e0ac166f_black-basta_cobalt-strike_floxif_hijackloader_luca-stealer
-
Size
208KB
-
MD5
7a79ac324cb4133629843c76e0ac166f
-
SHA1
6ff96bc50b15b5537b71d28297ee87db8d6bf0cc
-
SHA256
b355d65d881b540714d0eaabb3695c529e8c7726061b7ebcd7baa4b3d5a1abcf
-
SHA512
0f91307e64ed3c9e538ce9c9498b556a5d4bbb73343908ac4da6597ec3d56a40efb16b7ce5377ee8b36eb13f819b4633a3444f39370f56dfbe960ed04cf8a69e
-
SSDEEP
3072:EH0PD+CWh5lO6ZflUgNtpARctyz1zs87IgEt/+Z3j2lQBV+UdE+rECWp7hKJ/R:ESD+zXffegxAF+gNBV+UdvrEFp7hKJZ
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-