General
-
Target
00c4e525ffb64ff858bb8922e3ab46ee6d65c67a3fa7d9f3a614aaf1604f27e3
-
Size
520KB
-
Sample
240704-2ev64asgpp
-
MD5
3900de86228c8f839d6d4b483794457b
-
SHA1
90e24676fd3ebcda8635704e762e83d3fbd9cfba
-
SHA256
00c4e525ffb64ff858bb8922e3ab46ee6d65c67a3fa7d9f3a614aaf1604f27e3
-
SHA512
5bd0c7f623a6a3c11091391c72868c4462525618164d40a28a19dc5913766b7ebb2878206b4077a7374de23562343748e27e4594ad5c56434fb9fff40e91f4dc
-
SSDEEP
12288:EnlK6zDfP9TWIBmoWUlANmKr1AAMiBPM1:ErPf1CIUYJKrrPM
Static task
static1
Behavioral task
behavioral1
Sample
00c4e525ffb64ff858bb8922e3ab46ee6d65c67a3fa7d9f3a614aaf1604f27e3.exe
Resource
win7-20240611-en
Malware Config
Extracted
lumma
https://contintnetksows.shop/api
Targets
-
-
Target
00c4e525ffb64ff858bb8922e3ab46ee6d65c67a3fa7d9f3a614aaf1604f27e3
-
Size
520KB
-
MD5
3900de86228c8f839d6d4b483794457b
-
SHA1
90e24676fd3ebcda8635704e762e83d3fbd9cfba
-
SHA256
00c4e525ffb64ff858bb8922e3ab46ee6d65c67a3fa7d9f3a614aaf1604f27e3
-
SHA512
5bd0c7f623a6a3c11091391c72868c4462525618164d40a28a19dc5913766b7ebb2878206b4077a7374de23562343748e27e4594ad5c56434fb9fff40e91f4dc
-
SSDEEP
12288:EnlK6zDfP9TWIBmoWUlANmKr1AAMiBPM1:ErPf1CIUYJKrrPM
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-