General
-
Target
474fbd180a26139e8013595adedc0ce2bb434677ae667093f86d4a59b11c7045
-
Size
35.2MB
-
Sample
241201-rv44tstmc1
-
MD5
1414b254f44bba8e17b01983dc22adde
-
SHA1
a12059b028647968a03d9483815dc5c13bb4b841
-
SHA256
474fbd180a26139e8013595adedc0ce2bb434677ae667093f86d4a59b11c7045
-
SHA512
1ea087707ab1f63af26950714d11376bd284984dca4069ab5adf5e35b766b82c6f65447d770ada792a4d1e334e6f5952c0f917e227f3b318986bea819f33e899
-
SSDEEP
786432:XotrfQO1b8zWttlyhgMglwI4nFbZ2s7i4iOXmditJf0nnPl1x:4trPozWtPyhXJdi4i7EtW91
Static task
static1
Behavioral task
behavioral1
Sample
474fbd180a26139e8013595adedc0ce2bb434677ae667093f86d4a59b11c7045.msi
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
474fbd180a26139e8013595adedc0ce2bb434677ae667093f86d4a59b11c7045.msi
Resource
win10v2004-20241007-en
Malware Config
Extracted
lumma
https://secretionsuitcasenioise.shop/api
Targets
-
-
Target
474fbd180a26139e8013595adedc0ce2bb434677ae667093f86d4a59b11c7045
-
Size
35.2MB
-
MD5
1414b254f44bba8e17b01983dc22adde
-
SHA1
a12059b028647968a03d9483815dc5c13bb4b841
-
SHA256
474fbd180a26139e8013595adedc0ce2bb434677ae667093f86d4a59b11c7045
-
SHA512
1ea087707ab1f63af26950714d11376bd284984dca4069ab5adf5e35b766b82c6f65447d770ada792a4d1e334e6f5952c0f917e227f3b318986bea819f33e899
-
SSDEEP
786432:XotrfQO1b8zWttlyhgMglwI4nFbZ2s7i4iOXmditJf0nnPl1x:4trPozWtPyhXJdi4i7EtW91
-
Lumma family
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Modifies Windows Firewall
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Installer Packages
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Installer Packages
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1System Binary Proxy Execution
1Msiexec
1