Resubmissions

31-03-2023 17:52

230331-wf796acb99 8

31-03-2023 17:51

230331-wfhdqsde6w 1

General

  • Target

    Fluxus (3).zip

  • Size

    2.3MB

  • Sample

    230331-wf796acb99

  • MD5

    0ae0a6a9b090ff1645468003f45c4966

  • SHA1

    08f3983824bf49b1b6ea24b8e60c9ed1b026d0ab

  • SHA256

    52c33068b9931fdc17faba5a22551145953a49cc9937b22ff5996d64418c2615

  • SHA512

    b1c6e174173a105b496473da77ddadbebc1ac9920ba3d6b590d35a396b18b6eedf300300340974d6c0f0d49a51eadf7f2335b2a184591c8c892c06fb62fad120

  • SSDEEP

    49152:Qnh+kTdxfPN1eaV8XfnCbEi8IfThiq8rNiqrUc1:Qnk6xXN1eu8Y80khiyUc1

Malware Config

Targets

    • Target

      Fluxus/Fluxus V7.exe

    • Size

      3.9MB

    • MD5

      b4f9cbca656fd34c4dbb1d706a7f1ad3

    • SHA1

      2b95d88a80ccb619b581c420f7435c660cfbb28e

    • SHA256

      1e022d3886700317e5c41977de8fd595db5fbb3529164048ed09ee7efdb5711d

    • SHA512

      5ed86eaf8ae42d9a8f0dca9776e25b3c2232434b32088df7feaa8149886594f1d4b1e37c597597eacebdb4082e0263441a6b78def5eef2ad610a6875c28fe969

    • SSDEEP

      49152:UgLIR9JyCns59qfuce05XlWycazyClY1YH8PnGpv80tbvvqVUcH:UgLIRfyC7egWJa3lY1U82kmvvoUc

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Collection

Data from Local System

1
T1005

Tasks