Analysis
-
max time kernel
82s -
max time network
194s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2024 22:18
Static task
static1
Behavioral task
behavioral1
Sample
117373eadfa9f69a23f9e0bddd07a20518d5c1e1ce5e1cb6cfe942ed7c124569.exe
Resource
win7-20240221-en
General
-
Target
117373eadfa9f69a23f9e0bddd07a20518d5c1e1ce5e1cb6cfe942ed7c124569.exe
-
Size
378KB
-
MD5
d9a32885ee4da171a8362229942ea0af
-
SHA1
b13dc1c9971a5232f0bd74c61b8c14a9993f8247
-
SHA256
117373eadfa9f69a23f9e0bddd07a20518d5c1e1ce5e1cb6cfe942ed7c124569
-
SHA512
411469ec6bb75a5438f1398a01a1050fe2a8301e3a3682aa90c4ac800b09b61ffb3ed68ed41ea768202cd682a5f68e05bbac7f89c1adfbc5f06776113e4d9967
-
SSDEEP
6144:Qm6iST54ARDP6482ECFd48d4u6hDxDmqVlzU7CwtB/:R6iST+A9P6tKFd48h6hAqV5UG
Malware Config
Extracted
lumma
https://brickbrothjorkyooe.shop/api
Signatures
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1720 117373eadfa9f69a23f9e0bddd07a20518d5c1e1ce5e1cb6cfe942ed7c124569.exe 1720 117373eadfa9f69a23f9e0bddd07a20518d5c1e1ce5e1cb6cfe942ed7c124569.exe 1720 117373eadfa9f69a23f9e0bddd07a20518d5c1e1ce5e1cb6cfe942ed7c124569.exe 1720 117373eadfa9f69a23f9e0bddd07a20518d5c1e1ce5e1cb6cfe942ed7c124569.exe