Analysis
-
max time kernel
140s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 01:45
Static task
static1
Behavioral task
behavioral1
Sample
41ae7c8a95a5367900997394091ab6fb70b83157906df1c95f7dddf124a07532.exe
Resource
win7-20230220-en
General
-
Target
41ae7c8a95a5367900997394091ab6fb70b83157906df1c95f7dddf124a07532.exe
-
Size
977KB
-
MD5
86226298f5f7c878323137119929a4c1
-
SHA1
83db798ff6aee97864c18827749a3f1c5cbc4c51
-
SHA256
41ae7c8a95a5367900997394091ab6fb70b83157906df1c95f7dddf124a07532
-
SHA512
577249a3ea902b1f9615d2b98d3d2ed051d8dc6f286c42641cb1530183dc70afa529bc72a0214dec04f1ae5c270fb5b4f8dfa84fea887a5b5a6faa5a979b961d
-
SSDEEP
24576:TNmsC6pxpjI6YZ6dDyFqQCtqckiY7Y5u:T5RpU9ZSWFqrjkiK5
Malware Config
Extracted
lumma
82.117.255.80
Signatures
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3556-134-0x0000000002580000-0x0000000002695000-memory.dmpFilesize
1.1MB
-
memory/3556-135-0x0000000000400000-0x00000000007B7000-memory.dmpFilesize
3.7MB
-
memory/3556-136-0x0000000000400000-0x00000000007B7000-memory.dmpFilesize
3.7MB
-
memory/3556-137-0x0000000000400000-0x00000000007B7000-memory.dmpFilesize
3.7MB