General
-
Target
Install_x64.exe.vir
-
Size
152.8MB
-
Sample
240817-qmbxmszhqr
-
MD5
604062d27cc339e78ea521fe9006d644
-
SHA1
170592ee65755f0d3dc182cd4868f114654dbf65
-
SHA256
b04ea53d801862b98b10c1f83d899fdbb6f8685f02723dc11c26d5aea2abf9ad
-
SHA512
34c4b9d53d09e6a9834dd1188c8ccb98f485478f45707ec17b9f898e2b328e2310d9c7339850b491de442111131c27918ac46eaa9b7001ce3306e7f9fffd2f3b
-
SSDEEP
786432:dt20SZkMhfqpHCOdRIeoxOTx9ylnEk2Fd7yLie63pk3lLwmYEDz:dtKZkMMi5w9qEn7S6S3zY+
Static task
static1
Behavioral task
behavioral1
Sample
Install_x64.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Install_x64.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
stealc
mainteam
http://147.45.47.68
-
url_path
/a8f961c72f0d877c.php
Extracted
lumma
https://samledwwekspzxp.shop/api
https://writerospzm.shop/api
https://deallerospfosu.shop/api
https://bassizcellskz.shop/api
https://languagedscie.shop/api
https://complaintsipzzx.shop/api
https://quialitsuzoxm.shop/api
https://tenntysjuxmz.shop/api
Targets
-
-
Target
Install_x64.exe.vir
-
Size
152.8MB
-
MD5
604062d27cc339e78ea521fe9006d644
-
SHA1
170592ee65755f0d3dc182cd4868f114654dbf65
-
SHA256
b04ea53d801862b98b10c1f83d899fdbb6f8685f02723dc11c26d5aea2abf9ad
-
SHA512
34c4b9d53d09e6a9834dd1188c8ccb98f485478f45707ec17b9f898e2b328e2310d9c7339850b491de442111131c27918ac46eaa9b7001ce3306e7f9fffd2f3b
-
SSDEEP
786432:dt20SZkMhfqpHCOdRIeoxOTx9ylnEk2Fd7yLie63pk3lLwmYEDz:dtKZkMMi5w9qEn7S6S3zY+
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-