General

  • Target

    flameware free spoof.exe

  • Size

    445KB

  • Sample

    240317-ttb3rsac64

  • MD5

    4bbcdd97740fb152109f809a6625e0bb

  • SHA1

    69993fd2dc46acb60d4f95e553ab7bd66096305d

  • SHA256

    3156fea939c2b71683a306896ad4185b9c3afb57930fb17d9207ff78161e7dfd

  • SHA512

    5246b088157b6e3a1e61fb90c0cef054aafe11708ab12a9b35cf1ba5875080b2d037342637333eb57fc6cc41a918af1674bb91343c3c4a62ad2a4e03b0aa6417

  • SSDEEP

    6144:eSncRlyToy9yZ/koAvzDIjjL+dLCULOoepRXgtlAiLcW7tBWJ+q:z48ToYyZMoAvzDIjjSdBLyVW7tQJ3

Score
10/10

Malware Config

Targets

    • Target

      flameware free spoof.exe

    • Size

      445KB

    • MD5

      4bbcdd97740fb152109f809a6625e0bb

    • SHA1

      69993fd2dc46acb60d4f95e553ab7bd66096305d

    • SHA256

      3156fea939c2b71683a306896ad4185b9c3afb57930fb17d9207ff78161e7dfd

    • SHA512

      5246b088157b6e3a1e61fb90c0cef054aafe11708ab12a9b35cf1ba5875080b2d037342637333eb57fc6cc41a918af1674bb91343c3c4a62ad2a4e03b0aa6417

    • SSDEEP

      6144:eSncRlyToy9yZ/koAvzDIjjL+dLCULOoepRXgtlAiLcW7tBWJ+q:z48ToYyZMoAvzDIjjSdBLyVW7tQJ3

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks