General
-
Target
FoxyPunk Setup 1.0.0.exe
-
Size
75.3MB
-
Sample
241122-ppa8fszrgt
-
MD5
eae664b9d9b3ea6f3edce39e7ec5f37b
-
SHA1
227db8f955e6e27b736c48d75c4717fcc15a065e
-
SHA256
4cef20d3afbba0a91f02d6c1a9740fff94152426e3f7cbf94aaa55530833072d
-
SHA512
d2baae2a1a1143b4efb2428c2db6dc71ec6e3a282c6dd149ea50be9771a4916faafaee3d4c2053a8f948a6b34f854d5d3f76b13d55b49a478eb67ee445a87d39
-
SSDEEP
1572864:OyJ39Kk9M0+jB8ceyIS7nqYdd6hIEhSmnJZxRBlIiqFWQ:ORk9M0K/vP7nMhJnzxRBlawQ
Static task
static1
Behavioral task
behavioral1
Sample
FoxyPunk Setup 1.0.0.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
FoxyPunk Setup 1.0.0.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
FoxyPunk.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
FoxyPunk.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
FoxyPunk Setup 1.0.0.exe
-
Size
75.3MB
-
MD5
eae664b9d9b3ea6f3edce39e7ec5f37b
-
SHA1
227db8f955e6e27b736c48d75c4717fcc15a065e
-
SHA256
4cef20d3afbba0a91f02d6c1a9740fff94152426e3f7cbf94aaa55530833072d
-
SHA512
d2baae2a1a1143b4efb2428c2db6dc71ec6e3a282c6dd149ea50be9771a4916faafaee3d4c2053a8f948a6b34f854d5d3f76b13d55b49a478eb67ee445a87d39
-
SSDEEP
1572864:OyJ39Kk9M0+jB8ceyIS7nqYdd6hIEhSmnJZxRBlIiqFWQ:ORk9M0K/vP7nMhJnzxRBlawQ
Score10/10-
Hexon family
-
Blocklisted process makes network request
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist
-
-
-
Target
FoxyPunk.exe
-
Size
154.6MB
-
MD5
44ffbfd99f7bcbc3bc44649713a31ad4
-
SHA1
6cbdddacfdeb6799a59350899271e20b2ef2c702
-
SHA256
9a759e69e6b6f953221ed1e07e928e07d3fd4694e8c5f401169359512f406f74
-
SHA512
0dd09330009c8654729cfdcc9cdfb575aba7097f530659d9e69dbe3c6fae0a7a003169226ef20c49dbedc33b711079117157c8fab9510226d3807b60e8a4ed7d
-
SSDEEP
1572864:cTmw0ciLNpDPuAvHxJLkY2O6Ea3f9kwZXeT6EivLp1vUAtdjtZn+f4FnIvGaC9dU:3v6E70+Mk
Score10/10-
Hexon family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1