General

  • Target

    FLUX.exe

  • Size

    5.2MB

  • Sample

    240701-ghbawaxfma

  • MD5

    ee06c5d41c03b92cffa93b3cbeb3811d

  • SHA1

    82f25573eec37a19514cc13627b50e5965fcf841

  • SHA256

    87ca94357c2fca7b8ad9fc85d226c094246beea18f3cd5f93f9220ff3fad4bcc

  • SHA512

    e8d40ae2ea48688b8e1c3aa389cab67aea8540617f5a1a2b7acf4128456ed9f57576d0e7ae1bc8182d7c4d2d1ab6fd98027dda6953a7f6ddca0f17f3e7bf1768

  • SSDEEP

    98304:3xiOrMP6cKsDTf6GDeeR4IuNekhtg1T4b1O/GtOPA7xrkKJn+5:3xiOY6cK4rTas4Deotg18bA/IOm25

Malware Config

Targets

    • Target

      FLUX.exe

    • Size

      5.2MB

    • MD5

      ee06c5d41c03b92cffa93b3cbeb3811d

    • SHA1

      82f25573eec37a19514cc13627b50e5965fcf841

    • SHA256

      87ca94357c2fca7b8ad9fc85d226c094246beea18f3cd5f93f9220ff3fad4bcc

    • SHA512

      e8d40ae2ea48688b8e1c3aa389cab67aea8540617f5a1a2b7acf4128456ed9f57576d0e7ae1bc8182d7c4d2d1ab6fd98027dda6953a7f6ddca0f17f3e7bf1768

    • SSDEEP

      98304:3xiOrMP6cKsDTf6GDeeR4IuNekhtg1T4b1O/GtOPA7xrkKJn+5:3xiOY6cK4rTas4Deotg18bA/IOm25

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks