General
-
Target
2f01809f78d096e770544c434b5bb63b3a0461559f7dd98a25a04bf66c8784f4.exe
-
Size
5.1MB
-
Sample
241230-clqshstrf1
-
MD5
8a610c8380b7bc7c95472ea19ce2d4f3
-
SHA1
183c6c553dbf468c3867dd094d6cc95a70a404dc
-
SHA256
2f01809f78d096e770544c434b5bb63b3a0461559f7dd98a25a04bf66c8784f4
-
SHA512
398ad6062e4917aeded5f303ae87861159002dc2d4c37595064d6929ebc718bc460884a9328f53171a1fafad80350d772142dafc5f6f7b5b7bdc4e4bd12b281d
-
SSDEEP
98304:9XmejfcgConsANDqwo636BKK1KSlSsBq80hxTMqJhtl:9fc2pDqhT1KSnqlf7btl
Static task
static1
Behavioral task
behavioral1
Sample
2f01809f78d096e770544c434b5bb63b3a0461559f7dd98a25a04bf66c8784f4.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2f01809f78d096e770544c434b5bb63b3a0461559f7dd98a25a04bf66c8784f4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
lumma
Targets
-
-
Target
2f01809f78d096e770544c434b5bb63b3a0461559f7dd98a25a04bf66c8784f4.exe
-
Size
5.1MB
-
MD5
8a610c8380b7bc7c95472ea19ce2d4f3
-
SHA1
183c6c553dbf468c3867dd094d6cc95a70a404dc
-
SHA256
2f01809f78d096e770544c434b5bb63b3a0461559f7dd98a25a04bf66c8784f4
-
SHA512
398ad6062e4917aeded5f303ae87861159002dc2d4c37595064d6929ebc718bc460884a9328f53171a1fafad80350d772142dafc5f6f7b5b7bdc4e4bd12b281d
-
SSDEEP
98304:9XmejfcgConsANDqwo636BKK1KSlSsBq80hxTMqJhtl:9fc2pDqhT1KSnqlf7btl
-
Lumma family
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1