General
-
Target
file.exe
-
Size
210KB
-
Sample
230115-s4rqjacd7t
-
MD5
63f1cf4d473f59b211da781139c2602e
-
SHA1
c584e03ce15d4505fd32acb742c2a380a87cbbd4
-
SHA256
94cd01440758f627a06265285a8b50f0484d869d9ce4f6b904c0b9d37910b3a8
-
SHA512
4dc999e5dde7d23531ed3e172c9a623da5d1e437587c6456ea5240099fbf23c4ee43b9af7e0f30cd39199984417853cc08e9ca9d655c48578edbe4dbd5497e69
-
SSDEEP
3072:/XWPEBQS7Ha5yvF7+jn5/0rIApqj4/pdlFk1i:vp7YjN0rIApN
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
lumma
77.73.134.68
Targets
-
-
Target
file.exe
-
Size
210KB
-
MD5
63f1cf4d473f59b211da781139c2602e
-
SHA1
c584e03ce15d4505fd32acb742c2a380a87cbbd4
-
SHA256
94cd01440758f627a06265285a8b50f0484d869d9ce4f6b904c0b9d37910b3a8
-
SHA512
4dc999e5dde7d23531ed3e172c9a623da5d1e437587c6456ea5240099fbf23c4ee43b9af7e0f30cd39199984417853cc08e9ca9d655c48578edbe4dbd5497e69
-
SSDEEP
3072:/XWPEBQS7Ha5yvF7+jn5/0rIApqj4/pdlFk1i:vp7YjN0rIApN
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Sets DLL path for service in the registry
-
Sets service image path in registry
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-