General
-
Target
http://getlo4d.com/fooji
-
Sample
240620-2kkbsa1arc
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://getlo4d.com/fooji
Resource
win10v2004-20240611-en
Malware Config
Extracted
lumma
https://sailorshelfquids.shop/api
https://publicitycharetew.shop/api
https://computerexcudesp.shop/api
https://leafcalfconflcitw.shop/api
https://injurypiggyoewirog.shop/api
https://bargainnygroandjwk.shop/api
https://disappointcredisotw.shop/api
https://doughtdrillyksow.shop/api
https://facilitycoursedw.shop/api
Targets
-
-
Target
http://getlo4d.com/fooji
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-