General
-
Target
5402bb9bdc834258402ce782268c9099783e0ca7f9ead90a15827e7d3d3dcd54
-
Size
232KB
-
Sample
230116-l94tqahc9z
-
MD5
815a4342153b6263bb0d174c67d1a59c
-
SHA1
ffab6fa76ec5e563d9e6cc09c57dd5502eb3c979
-
SHA256
5402bb9bdc834258402ce782268c9099783e0ca7f9ead90a15827e7d3d3dcd54
-
SHA512
aff6974eab86d945d1a1151c3447604bc3629b1ce49da498064ed5c9b6b0f2b9c9a8090cf09361e31702d552bae508c15aef1c1305db4c97ac7ee447ea27e911
-
SSDEEP
6144:noQAJLuC4RZUjYziPqPUs9Cvz3jDHXyUC:noQ2y7RqPqPUsUvzfi
Static task
static1
Behavioral task
behavioral1
Sample
5402bb9bdc834258402ce782268c9099783e0ca7f9ead90a15827e7d3d3dcd54.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
lumma
77.73.134.68
Targets
-
-
Target
5402bb9bdc834258402ce782268c9099783e0ca7f9ead90a15827e7d3d3dcd54
-
Size
232KB
-
MD5
815a4342153b6263bb0d174c67d1a59c
-
SHA1
ffab6fa76ec5e563d9e6cc09c57dd5502eb3c979
-
SHA256
5402bb9bdc834258402ce782268c9099783e0ca7f9ead90a15827e7d3d3dcd54
-
SHA512
aff6974eab86d945d1a1151c3447604bc3629b1ce49da498064ed5c9b6b0f2b9c9a8090cf09361e31702d552bae508c15aef1c1305db4c97ac7ee447ea27e911
-
SSDEEP
6144:noQAJLuC4RZUjYziPqPUs9Cvz3jDHXyUC:noQ2y7RqPqPUsUvzfi
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Sets DLL path for service in the registry
-
Sets service image path in registry
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-