Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 21:28
Behavioral task
behavioral1
Sample
fluxus.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
fluxus.exe
Resource
win10v2004-20241007-en
General
-
Target
fluxus.exe
-
Size
73.5MB
-
MD5
d3e92d7f380607d8b4d230eefd3a12e3
-
SHA1
cf9ab3e50b4684153348098fea91d800f359cda4
-
SHA256
a61eb881291e75bdd460568fa7b88237517597b4bdad6cf3c86584de1379afc7
-
SHA512
122ae0ff4e576913166294298d809e34c72b933696969fec51d78410647a6809c66e935053019f4e699fe08f749144199b725ea2787d346dea881921ac244d02
-
SSDEEP
1572864:b1l+WdXmUSk8IpG7V+VPhqFxE7glhWiYweyJulZUdgUztCAuPd72:b1s0XmUSkB05awF1LLpuQMhZ2
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2400 fluxus.exe -
resource yara_rule behavioral1/files/0x00030000000208b1-1183.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2400 2644 fluxus.exe 30 PID 2644 wrote to memory of 2400 2644 fluxus.exe 30 PID 2644 wrote to memory of 2400 2644 fluxus.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5ebd1e51a1a1c1534f1695bc71beecbe0
SHA1280b29f98df389d5f239fc54d71b258b07a5d290
SHA2563ac7db2567f747a6a16447bc559a6aa20ba846ff9a6fdaf25f2b301a95889b90
SHA5122db7e56fb166ea95cadfd3eec13a003727b33dc56e07c6628d0ac3a07f3ac95075af8be09317151037c6bdc8c6d451f2fb8041598d3d68d593a2964fea0fe0e4