General
-
Target
FluxTeam.7z
-
Size
20.8MB
-
Sample
241208-ewyxzsxmaq
-
MD5
712567a666b820cda4fcea9cf5dc6b61
-
SHA1
efb6f5378de5120b60152c8a3366b6d0d8b536f5
-
SHA256
b6129cbb04b56add0cecefe73fcb25f30bc35c98cc90ee14cbda9b8b773a0a99
-
SHA512
707e8260d3dce6d884ec18c74b6ec6f81e707b0117ce45f88a595f9ccc3f16b357e36ef5f4bd8c5c15c9ff4b9496d23d0e3378194f1e4df936e36ecd5a591d3f
-
SSDEEP
393216:iETU+8dwON1Dy0fxtgtpKzwNFffPcGZRpDaLX7hJ9qvzZWJxy1h:iETUECJy0fzgtIzwk+RpU7EVGED
Static task
static1
Malware Config
Targets
-
-
Target
FluxTeam.7z
-
Size
20.8MB
-
MD5
712567a666b820cda4fcea9cf5dc6b61
-
SHA1
efb6f5378de5120b60152c8a3366b6d0d8b536f5
-
SHA256
b6129cbb04b56add0cecefe73fcb25f30bc35c98cc90ee14cbda9b8b773a0a99
-
SHA512
707e8260d3dce6d884ec18c74b6ec6f81e707b0117ce45f88a595f9ccc3f16b357e36ef5f4bd8c5c15c9ff4b9496d23d0e3378194f1e4df936e36ecd5a591d3f
-
SSDEEP
393216:iETU+8dwON1Dy0fxtgtpKzwNFffPcGZRpDaLX7hJ9qvzZWJxy1h:iETUECJy0fzgtIzwk+RpU7EVGED
-
A potential corporate email address has been identified in the URL: [email protected]
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-