General
-
Target
2025-04-03_0b63c20da5767c550d7058d187c43e82_black-basta_floxif_hijackloader_luca-stealer
-
Size
3.0MB
-
Sample
250403-v3n95atkv4
-
MD5
0b63c20da5767c550d7058d187c43e82
-
SHA1
4a0e9e70d4a16791e959640978aa58349a9b6ec4
-
SHA256
10df44515ef70e0999a8520beeb1dc5f29078955801cb13578819d6ce404ae9e
-
SHA512
c6c6abb9087b28717c0f01b8a94827e80a6537786bf0054be2253e3cc56254be3e06276da4564d4eb076cc25dc24219f3fff0a9fe1a943a1c5aa2c7c35e2fef0
-
SSDEEP
98304:Wls+unzGJl9ZTNDrimf5V2j6IkB6ZIVA0f8a:WlW8/riWkkB6ZCf8a
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-03_0b63c20da5767c550d7058d187c43e82_black-basta_floxif_hijackloader_luca-stealer.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
2025-04-03_0b63c20da5767c550d7058d187c43e82_black-basta_floxif_hijackloader_luca-stealer
-
Size
3.0MB
-
MD5
0b63c20da5767c550d7058d187c43e82
-
SHA1
4a0e9e70d4a16791e959640978aa58349a9b6ec4
-
SHA256
10df44515ef70e0999a8520beeb1dc5f29078955801cb13578819d6ce404ae9e
-
SHA512
c6c6abb9087b28717c0f01b8a94827e80a6537786bf0054be2253e3cc56254be3e06276da4564d4eb076cc25dc24219f3fff0a9fe1a943a1c5aa2c7c35e2fef0
-
SSDEEP
98304:Wls+unzGJl9ZTNDrimf5V2j6IkB6ZIVA0f8a:WlW8/riWkkB6ZCf8a
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-