General
-
Target
FLXTOOL.exe
-
Size
63KB
-
Sample
250106-bl376s1mdx
-
MD5
faf1be9e62e7afb4621e01d6c4e027b1
-
SHA1
b66b0e1ac8702bae29c70f8b2224e3c5ed6efb91
-
SHA256
2f3aa123e38c045e4e01fcc3d3b3a5f00145fcdf046d7927b5ed3bdeacf8ff63
-
SHA512
1b946c629df260ac05090a1af1096ffb3508dbc8007cac63d37a63edd178770502de3ac4b3be6057972753e9bc60de75aebfb56cf17a8740f889489c1b804e4d
-
SSDEEP
1536:cYmHsfGV/tWnp4Ubfh9DFpOuEdpqKmY7:cYVfGV0p4Ubf1mGz
Behavioral task
behavioral1
Sample
FLXTOOL.exe
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
Flx
call-instructional.gl.at.ply.gg:61865
-
delay
1
-
install
true
-
install_file
FLX.exe
-
install_folder
%AppData%
Targets
-
-
Target
FLXTOOL.exe
-
Size
63KB
-
MD5
faf1be9e62e7afb4621e01d6c4e027b1
-
SHA1
b66b0e1ac8702bae29c70f8b2224e3c5ed6efb91
-
SHA256
2f3aa123e38c045e4e01fcc3d3b3a5f00145fcdf046d7927b5ed3bdeacf8ff63
-
SHA512
1b946c629df260ac05090a1af1096ffb3508dbc8007cac63d37a63edd178770502de3ac4b3be6057972753e9bc60de75aebfb56cf17a8740f889489c1b804e4d
-
SSDEEP
1536:cYmHsfGV/tWnp4Ubfh9DFpOuEdpqKmY7:cYVfGV0p4Ubf1mGz
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-