General
-
Target
!!SetUp_2244_PassW0rds$.rar
-
Size
11.0MB
-
Sample
240825-pp3mpswbrp
-
MD5
9184f328f2ae2eef2e7d8cd2d30e2876
-
SHA1
c3f8f11558219f9b7d749f5ed7c87ab1db5bdebb
-
SHA256
fa157be2b242c587e27ad0ab592e9e2d9084d0964289d0abb05f2ef28a9984c6
-
SHA512
e4ec3023e4ef320885901a7ff9287797af70067aaf9e513b43159149fd9520a639ee4a56c04215292b76e86c6496aa1d188e4dae1c935bf0625df3510d4ce24d
-
SSDEEP
196608:E+rq1zmJ/Swklkdb18ilNbFmrDio5En3M0dmw0WK6n1aUFsAxfVvxftOLz9:E+rgCFklM8GSDf83MiWgoB2fVZft4B
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Setup.exe
Resource
win11-20240802-en
Malware Config
Extracted
lumma
https://calcuatllitwop.shop/api
https://locatedblsoqp.shop/api
https://traineiwnqo.shop/api
https://condedqpwqm.shop/api
https://millyscroqwp.shop/api
https://stagedchheiqwo.shop/api
https://stamppreewntnq.shop/api
https://caffegclasiqwp.shop/api
https://tenntysjuxmz.shop/api
Targets
-
-
Target
Setup.exe
-
Size
8.5MB
-
MD5
98169506fec94c2b12ba9930ad704515
-
SHA1
bce662a9fb94551f648ba2d7e29659957fd6a428
-
SHA256
9b8a5b0a45adf843e24214b46c285e44e73bc6eaf9e2a3b2c14a6d93ae541363
-
SHA512
7f4f7ac2326a1a8b7afc72822dae328753578eb0a4ffcec5adb4e4fb0c49703070f71e7411df221ee9f44d6b43a0a94921fe530877c5d5e71640b807e96def30
-
SSDEEP
196608:vdoUox8PFOegKz+qE1cnuyHgv3eZaOxqeXY4K:vC0O9m7EWEvbOxqetK
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Suspicious use of SetThreadContext
-