General
-
Target
NovaLauncher_44dc2817f4e85757cc52784cd3521c67.msi
-
Size
7.1MB
-
Sample
241127-ddm74atkby
-
MD5
44dc2817f4e85757cc52784cd3521c67
-
SHA1
41fc684fdb5331b3bc0a6a48f0903c530e3ff054
-
SHA256
4a0a4a787586fbc370a2721019013e158a88d5c5f78fd140c91b54af42103763
-
SHA512
66215cc9fb92c7ec5c9fdbe85df9a98bfb72cdfb48e8db51c4ea9bcbd22ff784d57313dea9a6a0a1ee98852d52bec455ad8983e15cab9cd163cbb136ed0f2d18
-
SSDEEP
196608:OdVx9BJKK09BYzW+ZUl4sK8bF/9NH5iPbPO:OdVx9s9BYzw4sK8bF/aTO
Static task
static1
Behavioral task
behavioral1
Sample
NovaLauncher_44dc2817f4e85757cc52784cd3521c67.msi
Resource
win11-20241007-en
Malware Config
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://fumblingactor.cyou
Targets
-
-
Target
NovaLauncher_44dc2817f4e85757cc52784cd3521c67.msi
-
Size
7.1MB
-
MD5
44dc2817f4e85757cc52784cd3521c67
-
SHA1
41fc684fdb5331b3bc0a6a48f0903c530e3ff054
-
SHA256
4a0a4a787586fbc370a2721019013e158a88d5c5f78fd140c91b54af42103763
-
SHA512
66215cc9fb92c7ec5c9fdbe85df9a98bfb72cdfb48e8db51c4ea9bcbd22ff784d57313dea9a6a0a1ee98852d52bec455ad8983e15cab9cd163cbb136ed0f2d18
-
SSDEEP
196608:OdVx9BJKK09BYzW+ZUl4sK8bF/9NH5iPbPO:OdVx9s9BYzw4sK8bF/aTO
-
Lumma family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Drops file in Drivers directory
-
A potential corporate email address has been identified in the URL: [email protected]
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Installer Packages
1Power Settings
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Installer Packages
1Defense Evasion
Impair Defenses
1Indicator Removal
1Clear Windows Event Logs
1System Binary Proxy Execution
1Msiexec
1