General
-
Target
18dc8fac237e8cb22397fe44f64c54863b4ed5f490042d759689d149856b8dd3
-
Size
210KB
-
Sample
230116-dr99sacd51
-
MD5
ebd42ae578479719653b35c33554ccc5
-
SHA1
da79aceadb98f5198c218438e1ff13900b206ec9
-
SHA256
18dc8fac237e8cb22397fe44f64c54863b4ed5f490042d759689d149856b8dd3
-
SHA512
0eaf3f62705ddab16e14a077bc29c52b22a99dd9b2212dcd0aeec9d92843b79b65bdde3b14a9170fc424aace760a6c80970916547039fa697814e7be639c1f12
-
SSDEEP
1536:gMQuk7EPCnpn2XcxezpkQYCPt9ldnXEp6Zd5X581Z1EnVx7C0NDuYHCx3IkwLuTy:gMXWEo+/hd5p73762CxYXSNti
Static task
static1
Behavioral task
behavioral1
Sample
18dc8fac237e8cb22397fe44f64c54863b4ed5f490042d759689d149856b8dd3.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
lumma
77.73.134.68
Targets
-
-
Target
18dc8fac237e8cb22397fe44f64c54863b4ed5f490042d759689d149856b8dd3
-
Size
210KB
-
MD5
ebd42ae578479719653b35c33554ccc5
-
SHA1
da79aceadb98f5198c218438e1ff13900b206ec9
-
SHA256
18dc8fac237e8cb22397fe44f64c54863b4ed5f490042d759689d149856b8dd3
-
SHA512
0eaf3f62705ddab16e14a077bc29c52b22a99dd9b2212dcd0aeec9d92843b79b65bdde3b14a9170fc424aace760a6c80970916547039fa697814e7be639c1f12
-
SSDEEP
1536:gMQuk7EPCnpn2XcxezpkQYCPt9ldnXEp6Zd5X581Z1EnVx7C0NDuYHCx3IkwLuTy:gMXWEo+/hd5p73762CxYXSNti
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Sets DLL path for service in the registry
-
Sets service image path in registry
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-