General
-
Target
e6b00ee585b008f110829df68c01a62d3bfac1ffe7d65298c8a4e4109b8a7319
-
Size
1.5MB
-
Sample
240724-zl3teawdrl
-
MD5
902f8f6c48da2b1e2e666dd2d4fbdf51
-
SHA1
36b6b48e868e65575533dc15326422754b67bb1e
-
SHA256
e6b00ee585b008f110829df68c01a62d3bfac1ffe7d65298c8a4e4109b8a7319
-
SHA512
84a002403e787c7eba040c571ac28905cbccc323f477e2bface82d9c3b550f2006646b74e9a177c04d08bc1270c36e5790c665954f5284d5d6f10c78a961a716
-
SSDEEP
24576:7TU1TIY2XqnwoR0TFwGl11eDjeR1WzfN3PN0g2tppmGOlfSXI4an5QSGuzsCY:7ABJfnmj11qeRy3V0vBGK4rn5ZhY
Static task
static1
Behavioral task
behavioral1
Sample
msoffice365update.msi
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
msoffice365update.msi
Resource
win10v2004-20240709-en
Malware Config
Extracted
lumma
https://warrantelespsz.shop/api
https://unseaffarignsk.shop/api
https://shepherdlyopzc.shop/api
https://upknittsoappz.shop/api
https://liernessfornicsa.shop/api
https://outpointsozp.shop/api
https://callosallsaospz.shop/api
https://lariatedzugspd.shop/api
https://indexterityszcoxp.shop/api
Targets
-
-
Target
msoffice365update.msi
-
Size
2.5MB
-
MD5
f95336c88ee7f8b6275fac1a458dad53
-
SHA1
79fea0be5521f44c6b3fd621fb4c95167ec7542f
-
SHA256
e9cd2429628e3955dd1f7c714fbaa3e3b85bfaac0bc31582cf9c5232cb8fc352
-
SHA512
aa75cdccc14381f7088bc6090029f4b36e484a4f3e3b0a60e90ded013aa258f47631f40670e200fce687c2271f89a7ef8c91926d5698291740b192927249b896
-
SSDEEP
49152:nQgIfhlTYEO+w2/64hnPRMB0WkuqES58NtvU:3IZlEN+wK6qRMB0WkufF
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-