General
-
Target
ioxyfx.bin.zip
-
Size
6.8MB
-
Sample
200929-3esc87jpws
-
MD5
04d118c90aec01264ac8bfcb8084cc6b
-
SHA1
159a5f57384ee1b9a81bb90ce842702a205b1b21
-
SHA256
38aad76353ccdf608dcad9510cdf169f167586eaa39bc3f8e4f22e7a0cb37bf0
-
SHA512
1cb754673e47cc491dbb84280adb01598b61ffc1adce2c5f7b02526b231f52e6ea49ff7910baab10fbe1153735d6e7e94fd5a06569ae762e0aea9f75bbbe472c
Static task
static1
Behavioral task
behavioral1
Sample
ioxyfx.bin.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
ioxyfx.bin.exe
Resource
win10v200722
Malware Config
Targets
-
-
Target
ioxyfx.bin
-
Size
7.1MB
-
MD5
d5f9fa1a8dca5319432f51a5891f7794
-
SHA1
2a937328f5b99eccb9b8c13ed71d6ffb9dff4521
-
SHA256
18f4123ee42f5a29f8df7bd1cf95ab73441f082584f390aa218c2dd1134f4055
-
SHA512
87013b63a9b153c5268784928394dfbf1eeff1b91eea6bdf187025e63d25c535e468e59a33f47d23682a386605bb314311e50a7edd1d6deb1b60f5008237a7d0
Score8/10-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory
-
Modifies service
-