Analysis
-
max time kernel
206s -
max time network
301s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
29/03/2024, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
cbce06ec75f77421b235a219959905a436f719198269f288f23f2625ae89ec83.exe
Resource
win7-20240221-en
General
-
Target
cbce06ec75f77421b235a219959905a436f719198269f288f23f2625ae89ec83.exe
-
Size
351KB
-
MD5
5016acab4e71c4e259faa455350aa6af
-
SHA1
6bcbb6cf47825ac0436205cddb5d384c620ee6da
-
SHA256
cbce06ec75f77421b235a219959905a436f719198269f288f23f2625ae89ec83
-
SHA512
a7d05e700c5036517fad0421db96115b922a2f16f81fa4a09f60573dbb19c7c488e5f35a7fdc5da5407146861ae50840be27ab8456f9f30c4443d653ad3cb922
-
SSDEEP
3072:HMDnn+SLJ2EVj+tunCXm4+qpF+Rg6SmmQuWcrnOE44ywXdCrNpNHggCGrVwW4Xn+:HMRhVjoIMFt6r+9hXArTrj4XIqzl
Malware Config
Extracted
lumma
https://brickbrothjorkyooe.shop/api
Signatures
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3112 cbce06ec75f77421b235a219959905a436f719198269f288f23f2625ae89ec83.exe 3112 cbce06ec75f77421b235a219959905a436f719198269f288f23f2625ae89ec83.exe 3112 cbce06ec75f77421b235a219959905a436f719198269f288f23f2625ae89ec83.exe 3112 cbce06ec75f77421b235a219959905a436f719198269f288f23f2625ae89ec83.exe