General
-
Target
flameware free spoof.exe
-
Size
445KB
-
Sample
240317-ttb3rsac64
-
MD5
4bbcdd97740fb152109f809a6625e0bb
-
SHA1
69993fd2dc46acb60d4f95e553ab7bd66096305d
-
SHA256
3156fea939c2b71683a306896ad4185b9c3afb57930fb17d9207ff78161e7dfd
-
SHA512
5246b088157b6e3a1e61fb90c0cef054aafe11708ab12a9b35cf1ba5875080b2d037342637333eb57fc6cc41a918af1674bb91343c3c4a62ad2a4e03b0aa6417
-
SSDEEP
6144:eSncRlyToy9yZ/koAvzDIjjL+dLCULOoepRXgtlAiLcW7tBWJ+q:z48ToYyZMoAvzDIjjSdBLyVW7tQJ3
Malware Config
Targets
-
-
Target
flameware free spoof.exe
-
Size
445KB
-
MD5
4bbcdd97740fb152109f809a6625e0bb
-
SHA1
69993fd2dc46acb60d4f95e553ab7bd66096305d
-
SHA256
3156fea939c2b71683a306896ad4185b9c3afb57930fb17d9207ff78161e7dfd
-
SHA512
5246b088157b6e3a1e61fb90c0cef054aafe11708ab12a9b35cf1ba5875080b2d037342637333eb57fc6cc41a918af1674bb91343c3c4a62ad2a4e03b0aa6417
-
SSDEEP
6144:eSncRlyToy9yZ/koAvzDIjjL+dLCULOoepRXgtlAiLcW7tBWJ+q:z48ToYyZMoAvzDIjjSdBLyVW7tQJ3
-
Detect Umbral payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-