General

  • Target

    Fluxus Android.zip

  • Size

    7.1MB

  • Sample

    240710-3jqb3swdkm

  • MD5

    cbab2551438839c66d82087766a36c38

  • SHA1

    9b836a086678ff6b857b5791ae34528ba6131c0a

  • SHA256

    2bed960877401d82dc9c4ab7c4a7b38abce7533d9bb7c1688790e2b38a782f4f

  • SHA512

    c0c636466b50b64b1b7f754d465ecbcd4ca76a4ecc425310fb09392540db522d2a6a30bb7ee33ed7b8402d7d8460c1076921056c7f12fa0b961e8827f66b2a31

  • SSDEEP

    196608:NWu707QkLQLAXLUrQdot+G4bWR4SjxpTNa7QsRH:NWu707QAQLMLU0doO0rjs7Q+

Malware Config

Targets

    • Target

      Fluxus.apk

    • Size

      10.3MB

    • MD5

      4f51b9ea40b4fbd59c8c4e4aecdef7a2

    • SHA1

      72470cb505fdda9da46c3dea9eba97d6080831be

    • SHA256

      b899ce17c635faca85c46f3559317942479f7eaf5075f5482e93aad155660a4b

    • SHA512

      890e88f2337633eac81a807197838eddfb6241a705ecbddcf243579c6be85f56b991768bd33d8dbbd08420bd2ceba20a762e99b93d92dd6093ef8ebce5f9aa26

    • SSDEEP

      196608:RF22K6KY84nVTbGdrHX4yrJ1ftRe1gOzLQcLO:RF22KBY8GVTbGdrfrPfTK51LO

    • Chaos

      Ransomware family first seen in June 2021.

    • Chaos Ransomware

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks