General
-
Target
2025-04-24_52c99e71e2bf345bb47462095bea1724_amadey_black-basta_cobalt-strike_elex_floxif_hijackloader_luca-stealer_smoke-loader
-
Size
371KB
-
Sample
250424-qbh7ksvrx5
-
MD5
52c99e71e2bf345bb47462095bea1724
-
SHA1
734517e6d2ec2fa22dd99f28618f52fd65a6d1d8
-
SHA256
bcc60a6cdfb39d87672226dbeeb346346752f7a92eb4313451fa9010d4cf99af
-
SHA512
22d4935f6201e1bd136d50c5024b3c17966c390f96cccb49bae3137e80d0cdb5bd1bd94d11ae8491301c4b95a23f448576dc2f8491c38c1a8218b6475744984d
-
SSDEEP
6144:VhabloKMimZI46P5BKb854fguJs3uVAOs5qiwckGIk0ggwJhi/rQx+D8dBV+Udvg:ul5MiU50ab854fgufK5qiw8Ik0ggwJhK
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-24_52c99e71e2bf345bb47462095bea1724_amadey_black-basta_cobalt-strike_elex_floxif_hijackloade.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
2025-04-24_52c99e71e2bf345bb47462095bea1724_amadey_black-basta_cobalt-strike_elex_floxif_hijackloade.exe
Resource
win11-20250410-en
Malware Config
Targets
-
-
Target
2025-04-24_52c99e71e2bf345bb47462095bea1724_amadey_black-basta_cobalt-strike_elex_floxif_hijackloader_luca-stealer_smoke-loader
-
Size
371KB
-
MD5
52c99e71e2bf345bb47462095bea1724
-
SHA1
734517e6d2ec2fa22dd99f28618f52fd65a6d1d8
-
SHA256
bcc60a6cdfb39d87672226dbeeb346346752f7a92eb4313451fa9010d4cf99af
-
SHA512
22d4935f6201e1bd136d50c5024b3c17966c390f96cccb49bae3137e80d0cdb5bd1bd94d11ae8491301c4b95a23f448576dc2f8491c38c1a8218b6475744984d
-
SSDEEP
6144:VhabloKMimZI46P5BKb854fguJs3uVAOs5qiwckGIk0ggwJhi/rQx+D8dBV+Udvg:ul5MiU50ab854fgufK5qiw8Ik0ggwJhK
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-