General
-
Target
4ebe4e62066ac10efc23e7b63e421cc153b426e036309dbf99e4a4aa97122782
-
Size
316KB
-
Sample
240319-xfdwzsbe62
-
MD5
cd4121ea74cbd684bdf3a08c0aaf54a4
-
SHA1
ee87db3dd134332b815d17d717b1ed36939dfa35
-
SHA256
4ebe4e62066ac10efc23e7b63e421cc153b426e036309dbf99e4a4aa97122782
-
SHA512
af2b1ee11be992295a932fb6bf6221a077c33823367e5f26aa7b4f9bdd573482a67b2dab90cc778096cd57bf5892adc0678d23fe73de39c29f9377b1835ca100
-
SSDEEP
6144:oIh0zAu3vOiefUQH3PDKcL90ICtZRIfNJcqTJt2e83Kvixc9Ai2kNND80:o+0cu3vOiX0qIsZRIfjcqdt2e83KSC5N
Behavioral task
behavioral1
Sample
4ebe4e62066ac10efc23e7b63e421cc153b426e036309dbf99e4a4aa97122782.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
lumma
185.99.133.246
Targets
-
-
Target
4ebe4e62066ac10efc23e7b63e421cc153b426e036309dbf99e4a4aa97122782
-
Size
316KB
-
MD5
cd4121ea74cbd684bdf3a08c0aaf54a4
-
SHA1
ee87db3dd134332b815d17d717b1ed36939dfa35
-
SHA256
4ebe4e62066ac10efc23e7b63e421cc153b426e036309dbf99e4a4aa97122782
-
SHA512
af2b1ee11be992295a932fb6bf6221a077c33823367e5f26aa7b4f9bdd573482a67b2dab90cc778096cd57bf5892adc0678d23fe73de39c29f9377b1835ca100
-
SSDEEP
6144:oIh0zAu3vOiefUQH3PDKcL90ICtZRIfNJcqTJt2e83Kvixc9Ai2kNND80:o+0cu3vOiX0qIsZRIfjcqdt2e83KSC5N
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-