General
-
Target
d29a8b9abec6833f4ddba954e182af711e9408a1714731da4c5f02aa2b7ab9b4
-
Size
8.2MB
-
Sample
240920-l2ff6a1arh
-
MD5
3038f6cc80903ca220ddd23d92bf37b7
-
SHA1
47eb963567a4a5cb6367bb9a3192517f4d73b4b1
-
SHA256
d29a8b9abec6833f4ddba954e182af711e9408a1714731da4c5f02aa2b7ab9b4
-
SHA512
4cb50d3292e55a32207a75f6bc85d9daed315723bf40517b66754ff5dc29f87142a7e854fc487f9a1965a4a4af429f66a87deb13062634dbd15763400b1a1e8a
-
SSDEEP
196608:7x7DhAje14TtWOsfqLUriPjZOEyu9SrSQOdaBG6V:RSjeChrsWUWPdpyNrZOdaBJ
Static task
static1
Behavioral task
behavioral1
Sample
d29a8b9abec6833f4ddba954e182af711e9408a1714731da4c5f02aa2b7ab9b4.exe
Resource
win7-20240708-en
Malware Config
Extracted
cryptbot
eihtvd18vs.top
analforeverlovyu.top
-
url_path
/v1/upload.php
Extracted
lumma
https://chammypaswiqo.shop/api
Targets
-
-
Target
d29a8b9abec6833f4ddba954e182af711e9408a1714731da4c5f02aa2b7ab9b4
-
Size
8.2MB
-
MD5
3038f6cc80903ca220ddd23d92bf37b7
-
SHA1
47eb963567a4a5cb6367bb9a3192517f4d73b4b1
-
SHA256
d29a8b9abec6833f4ddba954e182af711e9408a1714731da4c5f02aa2b7ab9b4
-
SHA512
4cb50d3292e55a32207a75f6bc85d9daed315723bf40517b66754ff5dc29f87142a7e854fc487f9a1965a4a4af429f66a87deb13062634dbd15763400b1a1e8a
-
SSDEEP
196608:7x7DhAje14TtWOsfqLUriPjZOEyu9SrSQOdaBG6V:RSjeChrsWUWPdpyNrZOdaBJ
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-