Analysis
-
max time kernel
32s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2024, 22:29
Static task
static1
General
-
Target
Echelon.exe
-
Size
6.4MB
-
MD5
cbdef49d32cf66bfa4c8a86d225b11bd
-
SHA1
bc2ce52834c6a615a8bd5d3b6aafd25239d03b44
-
SHA256
4e6c7876342928a4ca103e27e2a0823c0e8df2457ba32e5d62fcf94cb111a477
-
SHA512
84c6a436250dc12c2055c75abd318c07408c314388ac3c3209d22985955cb2d1cc9e916f29fb10d9257cb3d995a72cf91be83258e3151b6a0eda36125b831adb
-
SSDEEP
196608:YkywgD6ytCV8NxxKQP8v0ojDIg9Cbk/V8e:pyp621P8vXDd
Malware Config
Extracted
Family
lumma
C2
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
Signatures
-
Lumma family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Echelon.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3772 Echelon.exe 3772 Echelon.exe