General
-
Target
Install.exe
-
Size
459KB
-
Sample
241126-wsqkwayqeq
-
MD5
ad38d43c1eca47ac35ac2139b87379ac
-
SHA1
86cbcc824c314d83a1e50c9a9c5e720a3a94944d
-
SHA256
8bbceb5526f4c4cf26a60c0094e8ebbf7811cc54500bb86e07de84b64d5c223c
-
SHA512
7fd4755a2111064a78fd2d9cefa67773bf7fb190e389aac5b460e9f4d82f0302524436989a86fc6b525208c81726a3830ad5ba447763152d5ca964c204c78e28
-
SSDEEP
12288:vV4fznmsrVQRW8D8XpjHCpJ+IYCNIqI2070iailr7v:vuyCFXpc+IYvqager7v
Static task
static1
Behavioral task
behavioral1
Sample
Install.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Extracted
lumma
https://blade-govern.sbs/api
https://story-tense-faz.sbs/api
https://disobey-curly.sbs/api
https://motion-treesz.sbs/api
https://powerful-avoids.sbs/api
Targets
-
-
Target
Install.exe
-
Size
459KB
-
MD5
ad38d43c1eca47ac35ac2139b87379ac
-
SHA1
86cbcc824c314d83a1e50c9a9c5e720a3a94944d
-
SHA256
8bbceb5526f4c4cf26a60c0094e8ebbf7811cc54500bb86e07de84b64d5c223c
-
SHA512
7fd4755a2111064a78fd2d9cefa67773bf7fb190e389aac5b460e9f4d82f0302524436989a86fc6b525208c81726a3830ad5ba447763152d5ca964c204c78e28
-
SSDEEP
12288:vV4fznmsrVQRW8D8XpjHCpJ+IYCNIqI2070iailr7v:vuyCFXpc+IYvqager7v
-
Lumma family
-
Downloads MZ/PE file
-
A potential corporate email address has been identified in the URL: [email protected]
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Privilege Escalation
Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
3Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1