Overview
overview
10Static
static
7frhasdtr.exe
windows7-x64
10frhasdtr.exe
windows10-2004-x64
10lumma.exe
windows7-x64
10lumma.exe
windows10-2004-x64
10picturefonts.exe
windows7-x64
7picturefonts.exe
windows10-2004-x64
7rundll.exe
windows7-x64
1rundll.exe
windows10-2004-x64
10setup.exe
windows7-x64
7setup.exe
windows10-2004-x64
10General
-
Target
2a69f324a5524c24e3280c7d6e573ee0854ae8a6e12efe42f1c8cea50999ba74.zip
-
Size
26.3MB
-
Sample
241220-d6yvasykhy
-
MD5
a051137bf97fd34edbd1a7975d2deef8
-
SHA1
a90420d3961176cb06b32c2e0ea06a8156702767
-
SHA256
2a69f324a5524c24e3280c7d6e573ee0854ae8a6e12efe42f1c8cea50999ba74
-
SHA512
9c4cf1386974f32accaa65cc6dcd7e810b459a80b67b2e323719b0123ecd4868508b8d8e06caa9b935294cbdf88ed88f6794bdc324c44f13f0310c44b22ce3b2
-
SSDEEP
393216:/VEsG0s5H3Q9ExQI17Y2jc+KTwsNN0Fdic3n3ur22KLiGqt1kVAeN7aKC1:esG0syEGI17Yj+KTwK4n3O2kp1oAX
Behavioral task
behavioral1
Sample
frhasdtr.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
frhasdtr.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
lumma.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
lumma.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
picturefonts.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
picturefonts.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
rundll.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
rundll.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
setup.exe
Resource
win7-20240708-en
Malware Config
Extracted
lumma
https://commisionipwn.shop/api
https://stitchmiscpaew.shop/api
https://ignoracndwko.shop/api
https://grassemenwji.shop/api
https://charistmatwio.shop/api
https://basedsymsotp.shop/api
https://complainnykso.shop/api
https://preachstrwnwjw.shop/api
Extracted
stealc
Workbaza
http://5.35.36.211
-
url_path
/cadb6378d4b16104.php
Extracted
cobaltstrike
http://79.110.52.22:443/components/as.png
-
user_agent
Host: tgmcheck.com Connection: close User-Agent: Mozilla/5.0 (Linux; Android 7.0; Pixel C Build/NRD90M; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0
Targets
-
-
Target
frhasdtr.exe
-
Size
5.5MB
-
MD5
f6c0f0e730b0dccf2dfbd2bca9afd415
-
SHA1
8c930bc6004a3dafb7eb8d86b16ab5a59fa5e94a
-
SHA256
1d43e78596a3bdede8c56902959b4f2b08ca7f75200d22f44812b5f216631d5b
-
SHA512
d2864e6465583289d1ba771ad7c34d66c62d79e00c1549ce058df958aed12cf973242482616d0f7a2f79f44eae30271c8a0d3e0a7c2d4baa27ecf06938069c1d
-
SSDEEP
98304:DD1Ce4ecqudN79vLUjE8JJ6Y2cj0SSZ/Ifgmb2w8YeFQZ44spkBJWaeS/Wi:DD54/qg79oA6j0SSiDbBeC6m37z
-
Lumma family
-
-
-
Target
lumma.exe
-
Size
6.3MB
-
MD5
68821531a37ba7822fd5d67019733b6b
-
SHA1
b53de7324804e2775d46f2ec9a56627d706eb647
-
SHA256
39551af6337d3dca0ed2212e19e7b6648c8d4fca343c61a27e415602f321ceba
-
SHA512
5e249f08aa91641c00f43fff22b6d5d8c714a5b3e8ffe4dbaa8b223c5c65588cd0e821e3b98297cd638096c5b1c768099b5c8b9c368cefc951248adf1cf1616c
-
SSDEEP
196608:6qwtqwlk+lDCjExVbXZlL8UBk8Ocp0J89voSPn0:ik+aExVbJhbfYq0
-
Lumma family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
picturefonts.exe
-
Size
12.1MB
-
MD5
269a751b0c6d68cc39b2267c1592dae2
-
SHA1
2ead3153069297c67bb33c7a83e63d2721aa9f4d
-
SHA256
319d1dc217b7e83a85dd62cb2c066156ba5579087f11c991a99089606979ca28
-
SHA512
d8da3bf11287c5168544c3d39460b428252dd1f60f7777a3770bc537f89def019078f46b9695a78338bc227e67c902494912d36dcd046e2a514bd0bd96107929
-
SSDEEP
196608:K4V6se4m7QH0RD3noXrrj8dVtxqVjDdLMmGEMGHIr915DnjdZd:K4VtH0RD3oXryDxa5LBGlGHIrT5Tx/
Score7/10-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Suspicious use of SetThreadContext
-
-
-
Target
rundll.exe
-
Size
1.6MB
-
MD5
b6f38a50620db20ac5c231f924f3b4a5
-
SHA1
635d79bbab78af66e561e2146ed0f5926dc886fb
-
SHA256
24630db019f0de35f81c0a712d62ed04db084cdd287ea803f588e0f808186f98
-
SHA512
bf6fa80d2e973faab2bf8cdf35aa7a4975b511fe2175a57b4ba86c670a49fc17a8c2aa6389578df1cf6a065effc0057384873ff6215eca0cb693e77a3f8272ed
-
SSDEEP
12288:ehJK5SJT91q5uM97uyuYpxwu5T1v+rMORuIDJI4yN/6YYJNtuX3e9ifzRBexvVIx:kJP3qeyff5k+5/EP0+9ue52kaX58oj
Score10/10-
Cobaltstrike family
-
-
-
Target
setup.exe
-
Size
6.8MB
-
MD5
acb755d083c876f6a80105c17cc61754
-
SHA1
8ccfc2b30402e76a59ed07873b0ccf589728fd22
-
SHA256
b94bcdf5d6b9f1eb6abe97090993e8c4f66b514dd9c51193f16673e842253d86
-
SHA512
2d26da0b24c61e05a66583b548672f00b4351c87669fb8b7e4e71a73da4a2c0e470d7c6aa8072976fe8ca2ac5ea6b75e41f54b426c0d1de06aa118a83283b70b
-
SSDEEP
196608:DzSpVt4hhiIbZg4T4hac7p6eDcGRY9Dc+/7/MS6a:DWp74hVbehacQeHwDc+/7zb
-
Stealc family
-
Loads dropped DLL
-