General
-
Target
file.exe
-
Size
206KB
-
Sample
230115-fa359aea6x
-
MD5
8213372d2686414c996068c6f821042c
-
SHA1
7f9767dd0d71412abcfc5d6c07ceddce5bfe0672
-
SHA256
b1bc2eb5769d4aac65858a7873e477c87502efa4aafc2c62639dbe27dd951ef5
-
SHA512
b10fe5f3b5dfec8097b3f591d9503ebcc9591b462314ecb26eac8dd6fdbfd46edc0ecf593c94906724cedcb3e203f6176eee38e9f18778a39674edcb941651eb
-
SSDEEP
3072:BXtOI2FM5DWWTpi5YyAwbrHOMNpg+RS3xToapb:luFM5DWYeAMuFrp
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
lumma
77.73.134.68
Targets
-
-
Target
file.exe
-
Size
206KB
-
MD5
8213372d2686414c996068c6f821042c
-
SHA1
7f9767dd0d71412abcfc5d6c07ceddce5bfe0672
-
SHA256
b1bc2eb5769d4aac65858a7873e477c87502efa4aafc2c62639dbe27dd951ef5
-
SHA512
b10fe5f3b5dfec8097b3f591d9503ebcc9591b462314ecb26eac8dd6fdbfd46edc0ecf593c94906724cedcb3e203f6176eee38e9f18778a39674edcb941651eb
-
SSDEEP
3072:BXtOI2FM5DWWTpi5YyAwbrHOMNpg+RS3xToapb:luFM5DWYeAMuFrp
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Sets DLL path for service in the registry
-
Sets service image path in registry
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-