General
-
Target
FluxLoraV2.zip
-
Size
20.5MB
-
Sample
240620-v9p51ateqq
-
MD5
034e6e03682c07068f4aa310b21a9385
-
SHA1
4539639e80cfe7264bab3d77cd0e88660ecd4b96
-
SHA256
e2d0af9d4edc9c173093eef51a8869fff6a798d7ba912c620188807c91cb306a
-
SHA512
c1428fe584f1c74b66a74c9bf2f424943b45335067dd899c107418518df2754873b184a182145f310aba09adc5043133a8eb44a7740110f45989711e2b6063d9
-
SSDEEP
393216:x6Asd3zLBztGJFzGdIFS041BBygXqsxPgUhhalJGkIW2QCYHAr:xEdDLBRGTCIY041yUf9LNH
Behavioral task
behavioral1
Sample
FluxLoraV2.zip
Resource
win11-20240508-en
Behavioral task
behavioral2
Sample
FluxLoraV2/FluxLora.exe
Resource
win11-20240508-en
Behavioral task
behavioral3
Sample
FluxLoraV2/READ ME!!!!!!!!!!.txt
Resource
win11-20240611-en
Behavioral task
behavioral4
Sample
FluxLoraV2/SolarFix.exe
Resource
win11-20240611-en
Behavioral task
behavioral5
Sample
main.pyc
Resource
win11-20240611-en
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6700
4Et0bdTVvRcT
-
delay
3
-
install
true
-
install_file
FluxusV2.exe
-
install_folder
%AppData%
Targets
-
-
Target
FluxLoraV2.zip
-
Size
20.5MB
-
MD5
034e6e03682c07068f4aa310b21a9385
-
SHA1
4539639e80cfe7264bab3d77cd0e88660ecd4b96
-
SHA256
e2d0af9d4edc9c173093eef51a8869fff6a798d7ba912c620188807c91cb306a
-
SHA512
c1428fe584f1c74b66a74c9bf2f424943b45335067dd899c107418518df2754873b184a182145f310aba09adc5043133a8eb44a7740110f45989711e2b6063d9
-
SSDEEP
393216:x6Asd3zLBztGJFzGdIFS041BBygXqsxPgUhhalJGkIW2QCYHAr:xEdDLBRGTCIY041yUf9LNH
Score1/10 -
-
-
Target
FluxLoraV2/FluxLora.exe
-
Size
48KB
-
MD5
ace38670c00a34a910a1c5cb502f8f03
-
SHA1
3bfa515b1b4af4cca5e4d603e427fc2ebc8d5047
-
SHA256
0c3aa475f5ff4c8c2c271a27582f5480a29063d97006d5440c98409b3659fcbe
-
SHA512
ff40dccab360baff86e2545e810f6969d22587b750a646a46546e593069bf1d5633a9e20a0534437fc909bfc2d58bb32f840c23b7e879f677c9fbd18a609e0bc
-
SSDEEP
768:au2/0TckJ26WUsFvgmo2q7Dj/YlJ+4PIbwD9h5Dt40bQi45jeMSVLaza3ThwPClS:au2/0TceH27JCbwDr5DtzbQiIjeMqCPR
-
Async RAT payload
-
Executes dropped EXE
-
-
-
Target
FluxLoraV2/READ ME!!!!!!!!!!.txt
-
Size
271B
-
MD5
ad33b09e279104307ad3fc74801a5536
-
SHA1
86ee048beb7feb0ceacffdd321c0890bfbd240c1
-
SHA256
2b7eb313206ad20acc12888da322f271f84e4e183e4d3a3bdb6753eebc29f153
-
SHA512
27786ee604725fcff266900699456a3fa1fc85e6fddabcb5a5ce262cb9846bd567e2d90e9e1f9f390e103af63ee3d1c21d64cb9b3a8d8ffc799f1ac438b26ba6
Score3/10 -
-
-
Target
FluxLoraV2/SolarFix.exe
-
Size
20.6MB
-
MD5
5b2a845ebc71752c07a3ba04c01b9495
-
SHA1
57ea8bb5b689540508b13fa6a72c6c98162dff57
-
SHA256
30d3dc2086ce141e907a7e134654800131763a8f7d310889b1cd781ef44e47d5
-
SHA512
922557113fe5b5600b6d903a243c859fe72353f0b0b4e3abd5a319f6b034129abe6bab2b4c5e81e3d935596265c859467c175c8f2b5ff82f266a048e06f34426
-
SSDEEP
393216:6qPnLFXlr6v7n0jcjgQpDOETgsvfGAnKgBNKbS+vE4ALfiXdL:PPLFXN6Dic8QoEqW4m3M
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
main.pyc
-
Size
7KB
-
MD5
7ac46453f68c9aa421de49e3be8a7da8
-
SHA1
6aae0ec0779a969c00c203536d7bfc4a3adae157
-
SHA256
25d74e6d9f3a50c74267e3dd0090d82e3cc045671969fd19cbc32c57b08c23e3
-
SHA512
53e3ad7fa44fd1062e5e77ab5f36a5f961213475264ac3b1c892de8f8995e7c154e5d6e2d76bec86495a8879978d1786eb433fb0c5e3729525777a9687160c06
-
SSDEEP
192:wazHnVp5U9D8bjWdXwkFakqeB+lxNBJhwriPMdwbzjnw:97n5WuwaT72rQPbfw
Score3/10 -