General

  • Target

    flare_free-1.exe

  • Size

    26.1MB

  • Sample

    240825-jb6vbathnm

  • MD5

    8f3618adbf1fb938db83a39336f67afa

  • SHA1

    e0aadca4eb6122611678ceb4c60deffd4365b7d6

  • SHA256

    796fafe93957876b4593db96c58a3a4bfbd79cfac22ccabdecc3fb2b6c87ab5a

  • SHA512

    d5539d664f9cd8d94bc3f11b9af68e13cff8650d970d44d33a163319c5e476128f6684e54bd089d66a8559a96a27be5d93232c6503601479398cdd2e644c16da

  • SSDEEP

    786432:tPw7kwfw6m6Tk6qTPPKPpM+fu+7M0bnv+Pth:GQwG16wPkF2+40b6th

Malware Config

Targets

    • Target

      flare_free-1.exe

    • Size

      26.1MB

    • MD5

      8f3618adbf1fb938db83a39336f67afa

    • SHA1

      e0aadca4eb6122611678ceb4c60deffd4365b7d6

    • SHA256

      796fafe93957876b4593db96c58a3a4bfbd79cfac22ccabdecc3fb2b6c87ab5a

    • SHA512

      d5539d664f9cd8d94bc3f11b9af68e13cff8650d970d44d33a163319c5e476128f6684e54bd089d66a8559a96a27be5d93232c6503601479398cdd2e644c16da

    • SSDEEP

      786432:tPw7kwfw6m6Tk6qTPPKPpM+fu+7M0bnv+Pth:GQwG16wPkF2+40b6th

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks