General
-
Target
Fluxus Cracked.exe
-
Size
4.9MB
-
Sample
240511-ppdnksah66
-
MD5
7a182d7bd6c9304ea5e2fa27e007becc
-
SHA1
2ff3ccdad179d5ad23a59fedab2cb7b284f51af3
-
SHA256
6f7189376b953fd0a6e37f23d7f4bf6be70ff4d5cb39214a8d766bf9f6044511
-
SHA512
cdb5e2bcbbe16619ec008069ac5350743e965b6b89d335b85f36b055baa54f7006c0313093cf435ffc0c84854bfc1600992e2be8512d6436161ae4c3192bb8b6
-
SSDEEP
98304:BFVqfd/eLhdGYhfl0CcnVNB5G6X4RutZhjltPY5tnJTJmjPduN7umo1YU:IeL9Ncn93X8Yhl8nxJpumo1d
Static task
static1
Behavioral task
behavioral1
Sample
Fluxus Cracked.exe
Resource
win7-20240220-en
Malware Config
Targets
-
-
Target
Fluxus Cracked.exe
-
Size
4.9MB
-
MD5
7a182d7bd6c9304ea5e2fa27e007becc
-
SHA1
2ff3ccdad179d5ad23a59fedab2cb7b284f51af3
-
SHA256
6f7189376b953fd0a6e37f23d7f4bf6be70ff4d5cb39214a8d766bf9f6044511
-
SHA512
cdb5e2bcbbe16619ec008069ac5350743e965b6b89d335b85f36b055baa54f7006c0313093cf435ffc0c84854bfc1600992e2be8512d6436161ae4c3192bb8b6
-
SSDEEP
98304:BFVqfd/eLhdGYhfl0CcnVNB5G6X4RutZhjltPY5tnJTJmjPduN7umo1YU:IeL9Ncn93X8Yhl8nxJpumo1d
-
Detect ZGRat V1
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-