General

  • Target

    ioxyfx.bin.zip

  • Size

    6.8MB

  • Sample

    200929-3esc87jpws

  • MD5

    04d118c90aec01264ac8bfcb8084cc6b

  • SHA1

    159a5f57384ee1b9a81bb90ce842702a205b1b21

  • SHA256

    38aad76353ccdf608dcad9510cdf169f167586eaa39bc3f8e4f22e7a0cb37bf0

  • SHA512

    1cb754673e47cc491dbb84280adb01598b61ffc1adce2c5f7b02526b231f52e6ea49ff7910baab10fbe1153735d6e7e94fd5a06569ae762e0aea9f75bbbe472c

Malware Config

Targets

    • Target

      ioxyfx.bin

    • Size

      7.1MB

    • MD5

      d5f9fa1a8dca5319432f51a5891f7794

    • SHA1

      2a937328f5b99eccb9b8c13ed71d6ffb9dff4521

    • SHA256

      18f4123ee42f5a29f8df7bd1cf95ab73441f082584f390aa218c2dd1134f4055

    • SHA512

      87013b63a9b153c5268784928394dfbf1eeff1b91eea6bdf187025e63d25c535e468e59a33f47d23682a386605bb314311e50a7edd1d6deb1b60f5008237a7d0

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

    • Modifies service

MITRE ATT&CK Enterprise v6

Tasks