Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 07:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
skuxvbmtoa.exe
Resource
win7-20240903-en
2 signatures
150 seconds
General
-
Target
skuxvbmtoa.exe
-
Size
403KB
-
MD5
91ed2377577b6826acf615028b5465ca
-
SHA1
c29fc62fec945accaf9ea9e7a8498a300f6ab946
-
SHA256
511902af798bc82094dc7968242b8f608081c50839e7940ebf37eee7456072cb
-
SHA512
c09d3b33739e1ef729f55a09691a16b3a8981cd1b5293a7870a847f695bcdcd610a3ea1898b6147b2a8addce69c3b7d7c9fa57e524d13cdfecc630e48a25f884
-
SSDEEP
12288:RV3uHQGFv7v/1/1mHY/JXneCmAt1x6uSUqJWj:RVLY7XJ1mHY/JXnWKxd
Malware Config
Extracted
Family
lumma
C2
https://appealsozvmio.shop/api
https://writerospzm.shop/api
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skuxvbmtoa.exe