Resubmissions

30-12-2024 00:33

241230-awfzys1rcw 10

23-11-2024 17:50

241123-wewvqsvqel 10

23-11-2024 15:52

241123-ta714axlfv 10

23-11-2024 15:44

241123-s6yxmaxlb1 10

23-11-2024 15:41

241123-s41cnstlgk 10

General

  • Target

    FluxusTeamUPDATE.exe

  • Size

    81.5MB

  • Sample

    241230-awfzys1rcw

  • MD5

    984d89524164945150c9709b1dd1404b

  • SHA1

    363e6f6875c698355d1c5c777f8edf76e92adbd6

  • SHA256

    190c216a889b396f197c403a1e991fd08c88784ac7ba8949d55ca753a138681d

  • SHA512

    92835796a02cc271d544facc92509aef072433d19d544b080574c4fc68aa889d90d3ae83258cb42d0a0f0cd09741b01e529c66389373894477c65cc9a3462dd6

  • SSDEEP

    1572864:UGKlqWLT0hSk8IpG7V+VPhqclE7plifiYgj+h58sMwlerSipjcJ5j:1KMzSkB05awcIwB5BerTgj

Malware Config

Targets

    • Target

      FluxusTeamUPDATE.exe

    • Size

      81.5MB

    • MD5

      984d89524164945150c9709b1dd1404b

    • SHA1

      363e6f6875c698355d1c5c777f8edf76e92adbd6

    • SHA256

      190c216a889b396f197c403a1e991fd08c88784ac7ba8949d55ca753a138681d

    • SHA512

      92835796a02cc271d544facc92509aef072433d19d544b080574c4fc68aa889d90d3ae83258cb42d0a0f0cd09741b01e529c66389373894477c65cc9a3462dd6

    • SSDEEP

      1572864:UGKlqWLT0hSk8IpG7V+VPhqclE7plifiYgj+h58sMwlerSipjcJ5j:1KMzSkB05awcIwB5BerTgj

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks