General
-
Target
Setup.exe
-
Size
783.8MB
-
Sample
231207-zbyrpsfd73
-
MD5
8d9c7a1b7ffba697169f3186003b679a
-
SHA1
ede6be08abd60545284520e2951ae1f5fada14d9
-
SHA256
0b542c6e0cd48f9ddc6fc6420eed1b3e16db89a698c17af5a8c245ea7710b7eb
-
SHA512
e5d524bd9813dddd4d572bf294dddc9ea682f7b5d73e88d8d93b33454bfd79c091e13e08015ec95a7b0fa186ab31c05d800a904cabf8278be84d5d61ced72989
-
SSDEEP
1572864:ilRSYElRSYElRSYElRSYElRSYElRSYElRSYElRSYElRSYElRSYElRSYElRSYElRo:7
Static task
static1
Malware Config
Extracted
amadey
4.13
http://185.172.128.5
-
install_dir
4fdb51ccdc
-
install_file
Utsysc.exe
-
strings_key
11bb398ff31ee80d2c37571aecd1d36d
-
url_paths
/v8sjh3hs8/index.php
Extracted
amadey
http://185.172.128.5
-
strings_key
11bb398ff31ee80d2c37571aecd1d36d
-
url_paths
/v8sjh3hs8/index.php
Extracted
lumma
http://slantrearperiosdew.pw/api
http://laborermemorandumjes.pw/api
Targets
-
-
Target
Setup.exe
-
Size
783.8MB
-
MD5
8d9c7a1b7ffba697169f3186003b679a
-
SHA1
ede6be08abd60545284520e2951ae1f5fada14d9
-
SHA256
0b542c6e0cd48f9ddc6fc6420eed1b3e16db89a698c17af5a8c245ea7710b7eb
-
SHA512
e5d524bd9813dddd4d572bf294dddc9ea682f7b5d73e88d8d93b33454bfd79c091e13e08015ec95a7b0fa186ab31c05d800a904cabf8278be84d5d61ced72989
-
SSDEEP
1572864:ilRSYElRSYElRSYElRSYElRSYElRSYElRSYElRSYElRSYElRSYElRSYElRSYElRo:7
-
Detect Lumma Stealer payload V2
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-