General
-
Target
Fluxus Android.zip
-
Size
7.1MB
-
Sample
240710-3jqb3swdkm
-
MD5
cbab2551438839c66d82087766a36c38
-
SHA1
9b836a086678ff6b857b5791ae34528ba6131c0a
-
SHA256
2bed960877401d82dc9c4ab7c4a7b38abce7533d9bb7c1688790e2b38a782f4f
-
SHA512
c0c636466b50b64b1b7f754d465ecbcd4ca76a4ecc425310fb09392540db522d2a6a30bb7ee33ed7b8402d7d8460c1076921056c7f12fa0b961e8827f66b2a31
-
SSDEEP
196608:NWu707QkLQLAXLUrQdot+G4bWR4SjxpTNa7QsRH:NWu707QAQLMLU0doO0rjs7Q+
Static task
static1
Behavioral task
behavioral1
Sample
Fluxus.apk
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
Fluxus.apk
-
Size
10.3MB
-
MD5
4f51b9ea40b4fbd59c8c4e4aecdef7a2
-
SHA1
72470cb505fdda9da46c3dea9eba97d6080831be
-
SHA256
b899ce17c635faca85c46f3559317942479f7eaf5075f5482e93aad155660a4b
-
SHA512
890e88f2337633eac81a807197838eddfb6241a705ecbddcf243579c6be85f56b991768bd33d8dbbd08420bd2ceba20a762e99b93d92dd6093ef8ebce5f9aa26
-
SSDEEP
196608:RF22K6KY84nVTbGdrHX4yrJ1ftRe1gOzLQcLO:RF22KBY8GVTbGdrfrPfTK51LO
-
Chaos Ransomware
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
3File Deletion
3Modify Registry
4Pre-OS Boot
1Bootkit
1