General
-
Target
2025-04-24_2da01ccade1551297416ac0555c044ea_black-basta_elex_floxif_luca-stealer_mespinoza
-
Size
17.2MB
-
Sample
250424-p58tnavqs4
-
MD5
2da01ccade1551297416ac0555c044ea
-
SHA1
82e72b6f127f00c8cacdb6c04f7057586caebc4b
-
SHA256
31b1f5b8881333c46af5bdaafa7af7079af880e7cdf776dd445cf102e1935f93
-
SHA512
56e1d40229eacc08dda0f97f52f049e7b1063a95216a369dc5213d38eb7a79a6638887091fcff6cfb4cbc3cc65917ad3d77f4eacf1d4ee45bd10362cf586621e
-
SSDEEP
196608:Vr/jXXlCdV1CeRdFJ6VAVMC43aZRWRpuc2dkjwSiAKp:5oJdFJoaMkWRpuc2dkjwSiAKp
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-24_2da01ccade1551297416ac0555c044ea_black-basta_elex_floxif_luca-stealer_mespinoza.exe
Resource
win10v2004-20250410-en
Malware Config
Targets
-
-
Target
2025-04-24_2da01ccade1551297416ac0555c044ea_black-basta_elex_floxif_luca-stealer_mespinoza
-
Size
17.2MB
-
MD5
2da01ccade1551297416ac0555c044ea
-
SHA1
82e72b6f127f00c8cacdb6c04f7057586caebc4b
-
SHA256
31b1f5b8881333c46af5bdaafa7af7079af880e7cdf776dd445cf102e1935f93
-
SHA512
56e1d40229eacc08dda0f97f52f049e7b1063a95216a369dc5213d38eb7a79a6638887091fcff6cfb4cbc3cc65917ad3d77f4eacf1d4ee45bd10362cf586621e
-
SSDEEP
196608:Vr/jXXlCdV1CeRdFJ6VAVMC43aZRWRpuc2dkjwSiAKp:5oJdFJoaMkWRpuc2dkjwSiAKp
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-