General
-
Target
Fluxus.zip
-
Size
6.1MB
-
Sample
231001-v4egbacb7t
-
MD5
4d3a062f587c9b52a42d946efb86aa09
-
SHA1
3125cbae05a19b4b44daea7746ee9e829e9b3146
-
SHA256
2a86f2659501ad72546d1b730f886a2846cf253cb869980a18dbe3a3f347a3f6
-
SHA512
74f1c8b053b12952a507d3e75f21b2af38e13bb6d6b15e4ff251eb10011edef952accd262f0bf29335d9798f95a048243d06a09c6c5d0fe8bf2bbaf34ac7b43a
-
SSDEEP
196608:C0xxhEhfxe76uQ81eLuDJVzreb44IV/Z/HqS:ctxa6u/eCb2b4fVFqS
Static task
static1
Behavioral task
behavioral1
Sample
Fluxus/Fluxus V7.exe
Resource
win10-20230915-en
Behavioral task
behavioral2
Sample
Fluxus/bin/FluxusAuth.dll
Resource
win10-20230915-en
Malware Config
Targets
-
-
Target
Fluxus/Fluxus V7.exe
-
Size
2.9MB
-
MD5
9a75daf4d0c193193b7e0ac38fde5382
-
SHA1
22da0286430384889f3db0f5c56c72ebb577b0b0
-
SHA256
5bec4cee05762294b3dfe2cc4e26ef5f33aaceb4c1f1a0bc40c595f45a321665
-
SHA512
5274cf52c9086f0248d3298e3b1430451f1a960588cf4e4da3f8b927338fb520232edb056043b70f38031ee397bc0074705feb4a489066f63454fcb15b544bb8
-
SSDEEP
49152:PFvJA52joYoYdnZOYoB1oAzOBC5tMqiNHw+W7SCwGpv8M8w:zXoYoYdnZOYosHTgBkM
Score8/10-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
Fluxus/bin/FluxusAuth.dll
-
Size
4.3MB
-
MD5
8b7c95c980646614b4fd21414e489be7
-
SHA1
19c4cfeb0a5c4d2d305022bb34e817d63c6d5f25
-
SHA256
9f766783ca687dc5b7718350b673bc895cb9b0eb7e9185ea0b8044867c2bbbfe
-
SHA512
8027b1036c6ccd18b5f51e95a5ab687c65766cf63d1e619da9c91dca16dbdc68b2d85acde13955f600d0a32a914b4fdb76912e7b1c00a10327835ad6882c402a
-
SSDEEP
98304:jGHNrbValGSewGA1xJ6/ElY5i29bPNrh8s2iiDcAunb:j0klGSewv1X6/EQi2j8Fy
Score8/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-