General
-
Target
~!!SetUp_KEY_9696_PAas$c0De!%!!.zip
-
Size
3.1MB
-
Sample
240727-se5k4avdpm
-
MD5
eade8ec3fb15be090a784517edac94cd
-
SHA1
8c30ab460a1e60efbaa94bc2123ba756678b6dd5
-
SHA256
910ec7d764e93e5ffd27e4b623c445e1ab2b66efdd962aebb7f6913a21f3e030
-
SHA512
92a9ecc566e84172fc38742c0f73f9b9f1b9cd63db1910da82e529f1c61bec357e76746fc01938b64fd8bcbd93cc49cb56c13a04520f4b373f1abe6f942a5e00
-
SSDEEP
49152:DWFfIQoUex85paSmkQmzfQ/x54yi53m+N/7Lv7dqmWgRhsfscmYR95FE4bYg85nY:DAfIQde0Zzxyi53NpgmWHfs1YRv8sHJ
Static task
static1
Behavioral task
behavioral1
Sample
~!!SetUp_KEY_9696_PAas$c0De!%!!.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
~!!SetUp_KEY_9696_PAas$c0De!%!!.zip
Resource
win10v2004-20240709-en
Malware Config
Extracted
lumma
https://markerryshewi.shop/api
https://horizonvxjis.shop/api
https://effectivedoxzj.shop/api
https://parntorpkxzlp.shop/api
https://stimultaionsppzv.shop/api
https://grassytaisol.shop/api
https://broccoltisop.shop/api
https://shellfyyousdjz.shop/api
https://bravedreacisopm.shop/api
Extracted
lumma
https://markerryshewi.shop/api
https://horizonvxjis.shop/api
https://effectivedoxzj.shop/api
https://parntorpkxzlp.shop/api
https://stimultaionsppzv.shop/api
https://grassytaisol.shop/api
https://broccoltisop.shop/api
https://shellfyyousdjz.shop/api
https://bravedreacisopm.shop/api
Targets
-
-
Target
~!!SetUp_KEY_9696_PAas$c0De!%!!.zip
-
Size
3.1MB
-
MD5
eade8ec3fb15be090a784517edac94cd
-
SHA1
8c30ab460a1e60efbaa94bc2123ba756678b6dd5
-
SHA256
910ec7d764e93e5ffd27e4b623c445e1ab2b66efdd962aebb7f6913a21f3e030
-
SHA512
92a9ecc566e84172fc38742c0f73f9b9f1b9cd63db1910da82e529f1c61bec357e76746fc01938b64fd8bcbd93cc49cb56c13a04520f4b373f1abe6f942a5e00
-
SSDEEP
49152:DWFfIQoUex85paSmkQmzfQ/x54yi53m+N/7Lv7dqmWgRhsfscmYR95FE4bYg85nY:DAfIQde0Zzxyi53NpgmWHfs1YRv8sHJ
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
System Binary Proxy Execution: Verclsid
Adversaries may abuse Verclsid to proxy execution of malicious code.
-
Suspicious use of SetThreadContext
-