General
-
Target
277f441499c1fb9ddf4d462c3b443b9e
-
Size
4.2MB
-
Sample
231231-epwt2sfhaj
-
MD5
277f441499c1fb9ddf4d462c3b443b9e
-
SHA1
5cf5da3598e4cf139f6e6ffb9a4d32e49ac9321a
-
SHA256
05263375ffe64e8586c78e8e435007bff1f2a42684d48378eee68c07ba54a80e
-
SHA512
0ce74ab987eaf7371f79c22afcc16e319781ee7a7fcdcd995fff402788fbaa0e132df529db6e804549556f332ad8d8828e48b7ca8b27a7da22feadc21c09f871
-
SSDEEP
98304:pKHcMsDndy6iiHrjZE2/mkCUGP18szyTJr:w8dDlNLjpmkC/18ouJr
Static task
static1
Behavioral task
behavioral1
Sample
277f441499c1fb9ddf4d462c3b443b9e.exe
Resource
win7-20231215-en
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Targets
-
-
Target
277f441499c1fb9ddf4d462c3b443b9e
-
Size
4.2MB
-
MD5
277f441499c1fb9ddf4d462c3b443b9e
-
SHA1
5cf5da3598e4cf139f6e6ffb9a4d32e49ac9321a
-
SHA256
05263375ffe64e8586c78e8e435007bff1f2a42684d48378eee68c07ba54a80e
-
SHA512
0ce74ab987eaf7371f79c22afcc16e319781ee7a7fcdcd995fff402788fbaa0e132df529db6e804549556f332ad8d8828e48b7ca8b27a7da22feadc21c09f871
-
SSDEEP
98304:pKHcMsDndy6iiHrjZE2/mkCUGP18szyTJr:w8dDlNLjpmkC/18ouJr
-
Detect Lumma Stealer payload V4
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-