Analysis Overview
SHA256
b5af0bc161225e2ec1e0161d4a38af0b30f13a6e9e91f4ed3bc64de4e7940281
Threat Level: Known bad
The file FluxLora.zip was found to be: Known bad.
Malicious Activity Summary
AsyncRat
Asyncrat family
Async RAT payload
Async RAT payload
Executes dropped EXE
Checks computer location settings
Enumerates physical storage devices
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Delays execution with timeout.exe
Suspicious use of AdjustPrivilegeToken
Scheduled Task/Job: Scheduled Task
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-20 02:00
Signatures
Async RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Asyncrat family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-20 02:00
Reported
2024-06-20 02:01
Platform
win10v2004-20240508-en
Max time kernel
47s
Max time network
50s
Command Line
Signatures
Processes
C:\Windows\Explorer.exe
C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\FluxLora.zip
Network
Files
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-20 02:00
Reported
2024-06-20 02:01
Platform
win10v2004-20240508-en
Max time kernel
46s
Max time network
49s
Command Line
Signatures
AsyncRat
Async RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\FluxLoraV2\FluxLora.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\FluxusV2.exe | N/A |
Enumerates physical storage devices
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\FluxLoraV2\FluxLora.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\FluxusV2.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\FluxLoraV2\FluxLora.exe
"C:\Users\Admin\AppData\Local\Temp\FluxLoraV2\FluxLora.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "FluxusV2" /tr '"C:\Users\Admin\AppData\Roaming\FluxusV2.exe"' & exit
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp56AB.tmp.bat""
C:\Windows\SysWOW64\timeout.exe
timeout 3
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /sc onlogon /rl highest /tn "FluxusV2" /tr '"C:\Users\Admin\AppData\Roaming\FluxusV2.exe"'
C:\Users\Admin\AppData\Roaming\FluxusV2.exe
"C:\Users\Admin\AppData\Roaming\FluxusV2.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 127.0.0.1:6700 | tcp | |
| N/A | 127.0.0.1:6700 | tcp | |
| N/A | 127.0.0.1:6700 | tcp | |
| N/A | 127.0.0.1:6700 | tcp | |
| N/A | 127.0.0.1:6700 | tcp | |
| N/A | 127.0.0.1:6700 | tcp |
Files
memory/4896-0-0x0000000074C4E000-0x0000000074C4F000-memory.dmp
memory/4896-1-0x00000000009C0000-0x00000000009D2000-memory.dmp
memory/4896-2-0x0000000074C40000-0x00000000753F0000-memory.dmp
memory/4896-3-0x0000000005450000-0x00000000054EC000-memory.dmp
memory/4896-8-0x0000000074C40000-0x00000000753F0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmp56AB.tmp.bat
| MD5 | 499f9fd2150176d01afb5fe5d00d3ef4 |
| SHA1 | 1838547ca3cb13b3745ca8ef4fe25db1d09eb320 |
| SHA256 | 73de81f11dc8e0986dcc9b8823d5b95991ef3efe9f59ef03a51fcd1f8aca7602 |
| SHA512 | eab943355bedc971385b1c498367f1e348f97112530b853ac784884e10bfbe8f91fc2a6ae1256980a7642429c47122698c21da7607f8648299d44e40ee2957e0 |
C:\Users\Admin\AppData\Roaming\FluxusV2.exe
| MD5 | ace38670c00a34a910a1c5cb502f8f03 |
| SHA1 | 3bfa515b1b4af4cca5e4d603e427fc2ebc8d5047 |
| SHA256 | 0c3aa475f5ff4c8c2c271a27582f5480a29063d97006d5440c98409b3659fcbe |
| SHA512 | ff40dccab360baff86e2545e810f6969d22587b750a646a46546e593069bf1d5633a9e20a0534437fc909bfc2d58bb32f840c23b7e879f677c9fbd18a609e0bc |
memory/508-13-0x0000000074C40000-0x00000000753F0000-memory.dmp
memory/508-14-0x0000000074C40000-0x00000000753F0000-memory.dmp
Analysis: behavioral3
Detonation Overview
Submitted
2024-06-20 02:00
Reported
2024-06-20 02:01
Platform
win10v2004-20240611-en
Max time kernel
37s
Max time network
36s
Command Line
Signatures
Processes
C:\Windows\system32\NOTEPAD.EXE
C:\Windows\system32\NOTEPAD.EXE "C:\Users\Admin\AppData\Local\Temp\FluxLoraV2\READ ME!!!!!!!!!!.txt"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3932,i,3833046924978547022,12404847742964713612,262144 --variations-seed-version --mojo-platform-channel-handle=4244 /prefetch:8
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 17.160.190.20.in-addr.arpa | udp |
| BE | 88.221.83.187:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 82.90.14.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 187.83.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 92.12.20.2.in-addr.arpa | udp |