General
-
Target
FluxLora.zip
-
Size
26KB
-
Sample
240620-camxgsscmf
-
MD5
382a44b408a514fe3ab338a5e3d8b374
-
SHA1
5ba5888436ff907fcf76f9bcf47e6da317ad99f7
-
SHA256
b5af0bc161225e2ec1e0161d4a38af0b30f13a6e9e91f4ed3bc64de4e7940281
-
SHA512
8bc06dc0cf21a5da05d7d08354f04b64f9a411597ddcfdbc5d5063afdbb7e0ca60b24d20fb7b06ec75a03f8fdea9790b0bd92fd04ff013062038c55cd9b1a92f
-
SSDEEP
768:k00cW6Wu1wpyLBAFoYmBrQgqyK3yeEfoCQWUm:k7cWju1pLBA6nmf3yenCQs
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6700
4Et0bdTVvRcT
-
delay
3
-
install
true
-
install_file
FluxusV2.exe
-
install_folder
%AppData%
Targets
-
-
Target
FluxLoraV2/FluxLora.exe
-
Size
48KB
-
MD5
ace38670c00a34a910a1c5cb502f8f03
-
SHA1
3bfa515b1b4af4cca5e4d603e427fc2ebc8d5047
-
SHA256
0c3aa475f5ff4c8c2c271a27582f5480a29063d97006d5440c98409b3659fcbe
-
SHA512
ff40dccab360baff86e2545e810f6969d22587b750a646a46546e593069bf1d5633a9e20a0534437fc909bfc2d58bb32f840c23b7e879f677c9fbd18a609e0bc
-
SSDEEP
768:au2/0TckJ26WUsFvgmo2q7Dj/YlJ+4PIbwD9h5Dt40bQi45jeMSVLaza3ThwPClS:au2/0TceH27JCbwDr5DtzbQiIjeMqCPR
-
Async RAT payload
-
Executes dropped EXE
-