General
-
Target
8180c654901f5d8bdef512fcd9ee4b955eaa36af3f4e8fb98a25afce96b3a678
-
Size
207KB
-
Sample
230115-pchrrsad4z
-
MD5
1c0555106357d6faca334dcb8ff1dbc9
-
SHA1
47ca5ba29d61c87eecb77b832ec92cd1eea5b874
-
SHA256
8180c654901f5d8bdef512fcd9ee4b955eaa36af3f4e8fb98a25afce96b3a678
-
SHA512
44f2c487ad9d3f5559ad370b2b25fa6da347d5aea2be9a8162a5c6c8aace87649ffcf2095483857333ba55cab1046685adbff4be9ab48248e57c50d6df80bafe
-
SSDEEP
3072:7XNjkekpXqzcBksgI5jHtVTyfz51ou9pfmnh2GA/eEA+MDCUER4m4Si:TaqzpKHDyfV1PmUGEeEw
Static task
static1
Behavioral task
behavioral1
Sample
8180c654901f5d8bdef512fcd9ee4b955eaa36af3f4e8fb98a25afce96b3a678.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
lumma
77.73.134.68
Targets
-
-
Target
8180c654901f5d8bdef512fcd9ee4b955eaa36af3f4e8fb98a25afce96b3a678
-
Size
207KB
-
MD5
1c0555106357d6faca334dcb8ff1dbc9
-
SHA1
47ca5ba29d61c87eecb77b832ec92cd1eea5b874
-
SHA256
8180c654901f5d8bdef512fcd9ee4b955eaa36af3f4e8fb98a25afce96b3a678
-
SHA512
44f2c487ad9d3f5559ad370b2b25fa6da347d5aea2be9a8162a5c6c8aace87649ffcf2095483857333ba55cab1046685adbff4be9ab48248e57c50d6df80bafe
-
SSDEEP
3072:7XNjkekpXqzcBksgI5jHtVTyfz51ou9pfmnh2GA/eEA+MDCUER4m4Si:TaqzpKHDyfV1PmUGEeEw
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Sets DLL path for service in the registry
-
Sets service image path in registry
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-