General
-
Target
Bootstrapper.exe
-
Size
104KB
-
Sample
240903-wf7zdstdpg
-
MD5
4602690571ce74ace4458896a31ce202
-
SHA1
5478b08a3a6c8c6762a4628d5a66a32a573c7771
-
SHA256
ff2fce8e75f0f7261ddef3a3785943cc97623edb1e632ed935c8619f2adc7325
-
SHA512
0c4fbfea7274eb799cfe6a3a8aec81f011182f3077da6778b1e3ea1c71917639198fde8e2662411894ea788686c3f53c7e2b68c00e2e7d1d2b3f112ceac189b7
-
SSDEEP
3072:YuElCyYwC+M2FE6CyYwC+M2FE+80IZOAr:YZlhY7X2K6hY7X2K+h
Static task
static1
Malware Config
Extracted
lumma
https://tenseddrywsqio.shop/api
Targets
-
-
Target
Bootstrapper.exe
-
Size
104KB
-
MD5
4602690571ce74ace4458896a31ce202
-
SHA1
5478b08a3a6c8c6762a4628d5a66a32a573c7771
-
SHA256
ff2fce8e75f0f7261ddef3a3785943cc97623edb1e632ed935c8619f2adc7325
-
SHA512
0c4fbfea7274eb799cfe6a3a8aec81f011182f3077da6778b1e3ea1c71917639198fde8e2662411894ea788686c3f53c7e2b68c00e2e7d1d2b3f112ceac189b7
-
SSDEEP
3072:YuElCyYwC+M2FE6CyYwC+M2FE+80IZOAr:YZlhY7X2K6hY7X2K+h
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-