General
-
Target
e4fe2b92480a8ad512c643358c7add07588e8028c1526e5e874d292e6053d4a6.exe
-
Size
1.3MB
-
Sample
240807-cs5j9aycjj
-
MD5
5dbc9dfc9cde9b0e2117b2ed82c98c8d
-
SHA1
bdd1f983ed5640db4d1e09d1f824413c6f3608ff
-
SHA256
e4fe2b92480a8ad512c643358c7add07588e8028c1526e5e874d292e6053d4a6
-
SHA512
7b62eee3b9c095aaed878380678e7d1156d602c118a753182e4822ecaaf1011ec854a7c19e3f6d14238bee1a2388df9dd2902b7dc00a921d5f7ab66c49be99e4
-
SSDEEP
24576:SxLsMs8WdkZt8L5vqLGFRGybQNuRxaIa/OozGMBN9tcI4C:2sldht8IIkQgRxaIa/pzGMH9tcI4C
Static task
static1
Behavioral task
behavioral1
Sample
e4fe2b92480a8ad512c643358c7add07588e8028c1526e5e874d292e6053d4a6.exe
Resource
win7-20240729-en
Malware Config
Extracted
lumma
https://technologggisp.shop/api
https://horizonvxjis.shop/api
https://effectivedoxzj.shop/api
https://parntorpkxzlp.shop/api
https://stimultaionsppzv.shop/api
https://grassytaisol.shop/api
https://broccoltisop.shop/api
https://shellfyyousdjz.shop/api
https://bravedreacisopm.shop/api
Extracted
lumma
https://technologggisp.shop/api
https://horizonvxjis.shop/api
Targets
-
-
Target
e4fe2b92480a8ad512c643358c7add07588e8028c1526e5e874d292e6053d4a6.exe
-
Size
1.3MB
-
MD5
5dbc9dfc9cde9b0e2117b2ed82c98c8d
-
SHA1
bdd1f983ed5640db4d1e09d1f824413c6f3608ff
-
SHA256
e4fe2b92480a8ad512c643358c7add07588e8028c1526e5e874d292e6053d4a6
-
SHA512
7b62eee3b9c095aaed878380678e7d1156d602c118a753182e4822ecaaf1011ec854a7c19e3f6d14238bee1a2388df9dd2902b7dc00a921d5f7ab66c49be99e4
-
SSDEEP
24576:SxLsMs8WdkZt8L5vqLGFRGybQNuRxaIa/OozGMBN9tcI4C:2sldht8IIkQgRxaIa/pzGMH9tcI4C
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-