General
-
Target
perltonode.js
-
Size
6KB
-
Sample
250423-x7rbdsxyb1
-
MD5
861be769b12e6b30a35abf653174c162
-
SHA1
cb3a130953157378408543a12b8030cf3ff22245
-
SHA256
af1f9f8dba2d92b69457c946d82f73dd9600d1cb3cc70220dc1e97ffd3e8cf16
-
SHA512
77b3bdee3d930782690649feb27e07c3ca3182eae8a8d14259fbf1432a17f16a92bf26dc11a48f061765fc5f8c0f4797e0bedee1526d45488943e49f07f5f416
-
SSDEEP
192:ba+A1/P+zqyOq8KF4N6qzKwkzlSFwi/x8Osz:ERGqyB8KeB+1S+Uyl
Static task
static1
Behavioral task
behavioral1
Sample
perltonode.js
Resource
win11-20250410-en
Malware Config
Targets
-
-
Target
perltonode.js
-
Size
6KB
-
MD5
861be769b12e6b30a35abf653174c162
-
SHA1
cb3a130953157378408543a12b8030cf3ff22245
-
SHA256
af1f9f8dba2d92b69457c946d82f73dd9600d1cb3cc70220dc1e97ffd3e8cf16
-
SHA512
77b3bdee3d930782690649feb27e07c3ca3182eae8a8d14259fbf1432a17f16a92bf26dc11a48f061765fc5f8c0f4797e0bedee1526d45488943e49f07f5f416
-
SSDEEP
192:ba+A1/P+zqyOq8KF4N6qzKwkzlSFwi/x8Osz:ERGqyB8KeB+1S+Uyl
-
Floxif family
-
Modifies WinLogon for persistence
-
UAC bypass
-
Detects Floxif payload
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1JavaScript
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Subvert Trust Controls
1SIP and Trust Provider Hijacking
1