General
-
Target
9a36773bd13dc8187152f1b6eda52ab2e9b375746d6d7ff40db7bc230dde55a5
-
Size
206KB
-
Sample
230115-j71yyacc52
-
MD5
27563a743a23dadb84bb9b8eca509df7
-
SHA1
38914555fc792f4e97f72ec7ad3420ca27b47d8d
-
SHA256
9a36773bd13dc8187152f1b6eda52ab2e9b375746d6d7ff40db7bc230dde55a5
-
SHA512
a2ba7353061b8a97a80addc1d96952e0b168f32eb765444e0cfaa1f18fbcf27359df91438c9dbbc922f97c79a7b679091c6afc887b2d423738360f50b1f6f094
-
SSDEEP
3072:nXwM1MIy56tTQzB5XABqfz0seijbK+wpi1ARRxxwHRiQapb:XUIy56WzrXz8qK3kRKp
Static task
static1
Behavioral task
behavioral1
Sample
9a36773bd13dc8187152f1b6eda52ab2e9b375746d6d7ff40db7bc230dde55a5.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
lumma
77.73.134.68
Targets
-
-
Target
9a36773bd13dc8187152f1b6eda52ab2e9b375746d6d7ff40db7bc230dde55a5
-
Size
206KB
-
MD5
27563a743a23dadb84bb9b8eca509df7
-
SHA1
38914555fc792f4e97f72ec7ad3420ca27b47d8d
-
SHA256
9a36773bd13dc8187152f1b6eda52ab2e9b375746d6d7ff40db7bc230dde55a5
-
SHA512
a2ba7353061b8a97a80addc1d96952e0b168f32eb765444e0cfaa1f18fbcf27359df91438c9dbbc922f97c79a7b679091c6afc887b2d423738360f50b1f6f094
-
SSDEEP
3072:nXwM1MIy56tTQzB5XABqfz0seijbK+wpi1ARRxxwHRiQapb:XUIy56WzrXz8qK3kRKp
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Sets DLL path for service in the registry
-
Sets service image path in registry
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-