General
-
Target
98f6ecc60e016311511ce920220598b33eb9671e7c71254e76d638d0f2a45883.exe
-
Size
18.9MB
-
Sample
240406-btsfmsha53
-
MD5
ceadf477dd0dd9681578032f4a8f9c66
-
SHA1
b769c106316c626ae05b7aa95acd6773eb027370
-
SHA256
98f6ecc60e016311511ce920220598b33eb9671e7c71254e76d638d0f2a45883
-
SHA512
928149eb53d782e478175ca98bc6c5328aaa615a7076248265ff9553cabb0880fe8bffb7418d8dd4d0e13f1f38514ed47cec895e54a96e543ef19dd60b594ee5
-
SSDEEP
393216:u1GM169wLiaLBZlZvgmPqPNerU/odSkN1p/Us6uI6baSoKIna6tIw6aqyWzdIG/E:eJ1AajFPhU/6N1p9676eSaFmH7U5
Static task
static1
Behavioral task
behavioral1
Sample
98f6ecc60e016311511ce920220598b33eb9671e7c71254e76d638d0f2a45883.exe
Resource
win7-20240221-en
Malware Config
Extracted
lumma
https://officiallongberyw.shop/api
Targets
-
-
Target
98f6ecc60e016311511ce920220598b33eb9671e7c71254e76d638d0f2a45883.exe
-
Size
18.9MB
-
MD5
ceadf477dd0dd9681578032f4a8f9c66
-
SHA1
b769c106316c626ae05b7aa95acd6773eb027370
-
SHA256
98f6ecc60e016311511ce920220598b33eb9671e7c71254e76d638d0f2a45883
-
SHA512
928149eb53d782e478175ca98bc6c5328aaa615a7076248265ff9553cabb0880fe8bffb7418d8dd4d0e13f1f38514ed47cec895e54a96e543ef19dd60b594ee5
-
SSDEEP
393216:u1GM169wLiaLBZlZvgmPqPNerU/odSkN1p/Us6uI6baSoKIna6tIw6aqyWzdIG/E:eJ1AajFPhU/6N1p9676eSaFmH7U5
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-