General
-
Target
god jab.png
-
Size
685KB
-
Sample
231202-1e49bsga2z
-
MD5
cb3e014d6122af3b43933bb571859ae7
-
SHA1
a2936b702298dd773b8773903f3ce98399738d1f
-
SHA256
8f5c4bc356f2c00fcad015da8e52ca6173387edc93c75ae8c0c8fcf467283c2a
-
SHA512
7f6effef5cca34130c8bad47fbe502f5c91d1fb4d2d6828c3efde1733fbcd7ae52a7df897cde509ff8428d5fac19b3a1ab4854c6ca3f1bc362445e36d2412d1e
-
SSDEEP
12288:tg6zFAoqmcjAPSRwWike2c6/MK+5qDcRC39ikyVEJQ+zFobsV:KCCbntRwWYvj4cy5yKzFobk
Static task
static1
Malware Config
Extracted
lumma
http://cropfemininedynam.pw/api
http://tirechinecarpett.pw/api
http://cruelslumpeeris.pw/api
Targets
-
-
Target
god jab.png
-
Size
685KB
-
MD5
cb3e014d6122af3b43933bb571859ae7
-
SHA1
a2936b702298dd773b8773903f3ce98399738d1f
-
SHA256
8f5c4bc356f2c00fcad015da8e52ca6173387edc93c75ae8c0c8fcf467283c2a
-
SHA512
7f6effef5cca34130c8bad47fbe502f5c91d1fb4d2d6828c3efde1733fbcd7ae52a7df897cde509ff8428d5fac19b3a1ab4854c6ca3f1bc362445e36d2412d1e
-
SSDEEP
12288:tg6zFAoqmcjAPSRwWike2c6/MK+5qDcRC39ikyVEJQ+zFobsV:KCCbntRwWYvj4cy5yKzFobk
-
Detect PureLogs payload
-
Contacts a large (573) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Stops running service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Registers COM server for autorun
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Document created with cracked Office version
Office document contains Grizli777 string known to be caused by using a cracked version of the software.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Browser Extensions
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1