General
-
Target
Fluxus.exe
-
Size
1.1MB
-
Sample
240224-ss86fafe28
-
MD5
f5ab76e991b3993cb87592fd73f7f085
-
SHA1
3674f19b3edb1e70ef70eeed43ec0abe51762a4e
-
SHA256
9bd3396602ac3cdb6508b15170466a45aef3c1dec2ae26384928f0c968de93d3
-
SHA512
36893eaf345645aa9dbea58d5e14a569b5f45d105d5e12412c0c42dddf585ffdafa28fc8ae3d44a6e3270d7de88377436a7ea6aff91e51c2daa43a0c4b3e83ec
-
SSDEEP
24576:U2G/nvxW3Ww0tKw0yRCKkqDtDRNkm7LW98tGTCs3UdM:UbA30gAHNqIhG
Behavioral task
behavioral1
Sample
Fluxus.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Fluxus.exe
Resource
win10v2004-20240221-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1210617396449251438/U-VjIPQsCfZ4pTjSW3Z1gHU__HbtzMvbFPpRLmLEuU2JKQ6AE2B9xW4bmo3NKRYSGcl8
Extracted
xworm
5.0
7HPThVXvkAP1rsac
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/U0WSvAxn
Targets
-
-
Target
Fluxus.exe
-
Size
1.1MB
-
MD5
f5ab76e991b3993cb87592fd73f7f085
-
SHA1
3674f19b3edb1e70ef70eeed43ec0abe51762a4e
-
SHA256
9bd3396602ac3cdb6508b15170466a45aef3c1dec2ae26384928f0c968de93d3
-
SHA512
36893eaf345645aa9dbea58d5e14a569b5f45d105d5e12412c0c42dddf585ffdafa28fc8ae3d44a6e3270d7de88377436a7ea6aff91e51c2daa43a0c4b3e83ec
-
SSDEEP
24576:U2G/nvxW3Ww0tKw0yRCKkqDtDRNkm7LW98tGTCs3UdM:UbA30gAHNqIhG
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Umbral payload
-
Detect Xworm Payload
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1