General
-
Target
42b3ab0b27fbcb1aebd765f8673659bc4474f218f2109fffd167bd80b0d25c9e
-
Size
207KB
-
Sample
230115-d5y4nsdd4y
-
MD5
d9c239d1809017a6cf0114686cba3fcf
-
SHA1
a4768bff068507476a4b54e19be9ad0ef15b53e5
-
SHA256
42b3ab0b27fbcb1aebd765f8673659bc4474f218f2109fffd167bd80b0d25c9e
-
SHA512
151ffc4e8afa6bf6fab692745e2b0199e05a87c5d2b43274ba69d02ef7db04d1b31895ca1206a9c1df13ad6dc1f4e1d6272bfd5c7f3f635de8391f669b1c0e4b
-
SSDEEP
3072:EXwFN2C+tulvztr5lJRmELFyuFOd6MA9xCOw7Sapb:AxC+tuxtjLUuFO+9kvp
Static task
static1
Behavioral task
behavioral1
Sample
42b3ab0b27fbcb1aebd765f8673659bc4474f218f2109fffd167bd80b0d25c9e.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
lumma
77.73.134.68
Targets
-
-
Target
42b3ab0b27fbcb1aebd765f8673659bc4474f218f2109fffd167bd80b0d25c9e
-
Size
207KB
-
MD5
d9c239d1809017a6cf0114686cba3fcf
-
SHA1
a4768bff068507476a4b54e19be9ad0ef15b53e5
-
SHA256
42b3ab0b27fbcb1aebd765f8673659bc4474f218f2109fffd167bd80b0d25c9e
-
SHA512
151ffc4e8afa6bf6fab692745e2b0199e05a87c5d2b43274ba69d02ef7db04d1b31895ca1206a9c1df13ad6dc1f4e1d6272bfd5c7f3f635de8391f669b1c0e4b
-
SSDEEP
3072:EXwFN2C+tulvztr5lJRmELFyuFOd6MA9xCOw7Sapb:AxC+tuxtjLUuFO+9kvp
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Sets DLL path for service in the registry
-
Sets service image path in registry
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-