General
-
Target
04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a
-
Size
1.9MB
-
Sample
241004-a36h7avgkl
-
MD5
a00b2cfa83db42323e19d954710c74e1
-
SHA1
d24e3546f6b758d64c86e7ac48f422ed97ea729a
-
SHA256
04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a
-
SHA512
cd3d85d24ef07771df20218e7e8743777156151436e58c029a3c89f804c3bbb477dc18fed67f1f5e97d3c5c31522fb673a1a109e47859f683ed7cc600067ec6a
-
SSDEEP
49152:qvnMlvvvqFI3rUUan7yeCz3i96K0nLAcR3YmPXHXcK:64vWI3rJa7yeCzjDnUcRImPXHr
Static task
static1
Behavioral task
behavioral1
Sample
04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lumma
https://beearvagueo.site/api
Targets
-
-
Target
04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a
-
Size
1.9MB
-
MD5
a00b2cfa83db42323e19d954710c74e1
-
SHA1
d24e3546f6b758d64c86e7ac48f422ed97ea729a
-
SHA256
04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a
-
SHA512
cd3d85d24ef07771df20218e7e8743777156151436e58c029a3c89f804c3bbb477dc18fed67f1f5e97d3c5c31522fb673a1a109e47859f683ed7cc600067ec6a
-
SSDEEP
49152:qvnMlvvvqFI3rUUan7yeCz3i96K0nLAcR3YmPXHXcK:64vWI3rJa7yeCzjDnUcRImPXHr
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Indirect Command Execution
Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Indirect Command Execution
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3