General
-
Target
d5f744e39a1c58cdc50018233882c5cb2762ceba9fefad7fbb623dfe548b7dce
-
Size
207KB
-
Sample
230115-rf14mabe8y
-
MD5
9d7d6a09952da6397ff7d3b6fcb604c3
-
SHA1
8c87a053685db523cc629f737cca8296de9cb5db
-
SHA256
d5f744e39a1c58cdc50018233882c5cb2762ceba9fefad7fbb623dfe548b7dce
-
SHA512
21c062272f367a42b1b10ec96061c47bb7cf2279678e25e73abb490da290cb92f4670d1a9651b3f07d9ea8eac4ceb8a69c5bf360f9803a8e2d7adf5afa87fd4b
-
SSDEEP
3072:kXtlfKYYlomI5Og5K76G9Hyj/npg0WKa0AkSVL4hi:gfh5Jm9oxERhkS
Static task
static1
Behavioral task
behavioral1
Sample
d5f744e39a1c58cdc50018233882c5cb2762ceba9fefad7fbb623dfe548b7dce.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
lumma
77.73.134.68
Targets
-
-
Target
d5f744e39a1c58cdc50018233882c5cb2762ceba9fefad7fbb623dfe548b7dce
-
Size
207KB
-
MD5
9d7d6a09952da6397ff7d3b6fcb604c3
-
SHA1
8c87a053685db523cc629f737cca8296de9cb5db
-
SHA256
d5f744e39a1c58cdc50018233882c5cb2762ceba9fefad7fbb623dfe548b7dce
-
SHA512
21c062272f367a42b1b10ec96061c47bb7cf2279678e25e73abb490da290cb92f4670d1a9651b3f07d9ea8eac4ceb8a69c5bf360f9803a8e2d7adf5afa87fd4b
-
SSDEEP
3072:kXtlfKYYlomI5Og5K76G9Hyj/npg0WKa0AkSVL4hi:gfh5Jm9oxERhkS
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Sets DLL path for service in the registry
-
Sets service image path in registry
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-