General

  • Target

    FLUXSUS V1.exe

  • Size

    11.8MB

  • Sample

    240223-xf2m2sfb27

  • MD5

    3a1700e90971fe77ba85fc3eef69289a

  • SHA1

    e0ea8d9a1ccb1af1f2d2c0ba169f2ad2ad47ffc4

  • SHA256

    e6e8e1fb686965697ba4aa678d915b06feb44c31066893a957cbaa7b2c854d37

  • SHA512

    92940df474d07b5f4f0f235a00817e24df108e9af40847e7ddd4d2e270062df549821449c90146320fb08716cdc73629abb0052a7b628fb1ada697bf58036451

  • SSDEEP

    196608:DGXPjJymU0Ko/b+iBsGZ7KngtE+YK3fds:DubYcKoT5XZ7KiE+zfe

Malware Config

Targets

    • Target

      FLUXSUS V1.exe

    • Size

      11.8MB

    • MD5

      3a1700e90971fe77ba85fc3eef69289a

    • SHA1

      e0ea8d9a1ccb1af1f2d2c0ba169f2ad2ad47ffc4

    • SHA256

      e6e8e1fb686965697ba4aa678d915b06feb44c31066893a957cbaa7b2c854d37

    • SHA512

      92940df474d07b5f4f0f235a00817e24df108e9af40847e7ddd4d2e270062df549821449c90146320fb08716cdc73629abb0052a7b628fb1ada697bf58036451

    • SSDEEP

      196608:DGXPjJymU0Ko/b+iBsGZ7KngtE+YK3fds:DubYcKoT5XZ7KiE+zfe

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks