General
-
Target
0d1117671114c9eea71961ca6224a0258e8df81f98e98df6b1002f7f77607097N
-
Size
4.2MB
-
Sample
241110-rmse3axphx
-
MD5
1cd42299a0a2d6e1e0418cfb1b4195f0
-
SHA1
ff213631bc4beb032a4f499c6a374cf44fcfb1bc
-
SHA256
0d1117671114c9eea71961ca6224a0258e8df81f98e98df6b1002f7f77607097
-
SHA512
d4775e17e51106e2944cf6f2f8d6fd66e6b1d6db3af33fd19e7201454f7567ddc8ebf71ebad79e209cee0fd444c2f93f1d7f41bebbe861012579f5faaf61bf66
-
SSDEEP
98304:UWKT+M0e7zfdN9VCiHwHSdIfAI4JLtwwy5TZTsWPVxbtk9:Uv8WzfdN9V0ydEB4JLqb5TZTfPVxbtk9
Static task
static1
Behavioral task
behavioral1
Sample
0d1117671114c9eea71961ca6224a0258e8df81f98e98df6b1002f7f77607097N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://navygenerayk.store/api
Targets
-
-
Target
0d1117671114c9eea71961ca6224a0258e8df81f98e98df6b1002f7f77607097N
-
Size
4.2MB
-
MD5
1cd42299a0a2d6e1e0418cfb1b4195f0
-
SHA1
ff213631bc4beb032a4f499c6a374cf44fcfb1bc
-
SHA256
0d1117671114c9eea71961ca6224a0258e8df81f98e98df6b1002f7f77607097
-
SHA512
d4775e17e51106e2944cf6f2f8d6fd66e6b1d6db3af33fd19e7201454f7567ddc8ebf71ebad79e209cee0fd444c2f93f1d7f41bebbe861012579f5faaf61bf66
-
SSDEEP
98304:UWKT+M0e7zfdN9VCiHwHSdIfAI4JLtwwy5TZTsWPVxbtk9:Uv8WzfdN9V0ydEB4JLqb5TZTfPVxbtk9
-
Lumma family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-