General
-
Target
cc5eb5ac7cb599572a1c9747efa83774221e0ad4a24ed6545d5bc03a44a23196.exe
-
Size
15KB
-
Sample
241231-dfa1jstnb1
-
MD5
9be5ac720dcf1838fd5a2d7352672f66
-
SHA1
d8046191a1d1756768a8bad62ce3ba757deb7d53
-
SHA256
cc5eb5ac7cb599572a1c9747efa83774221e0ad4a24ed6545d5bc03a44a23196
-
SHA512
72f618868c9960332931d7055a4bff5b3394979a1f5d8089d51c6dc436a121a3d9332d405a3eb3f65fcb8c5930c73606e194782fcf29b46d5e42235de29acc33
-
SSDEEP
384:8dGRmTbW+eO9GXSrtx2MUyQ6JCgf61FDOVV:QzGXaff61FDO7
Static task
static1
Behavioral task
behavioral1
Sample
cc5eb5ac7cb599572a1c9747efa83774221e0ad4a24ed6545d5bc03a44a23196.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://framekgirus.shop/api
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Targets
-
-
Target
cc5eb5ac7cb599572a1c9747efa83774221e0ad4a24ed6545d5bc03a44a23196.exe
-
Size
15KB
-
MD5
9be5ac720dcf1838fd5a2d7352672f66
-
SHA1
d8046191a1d1756768a8bad62ce3ba757deb7d53
-
SHA256
cc5eb5ac7cb599572a1c9747efa83774221e0ad4a24ed6545d5bc03a44a23196
-
SHA512
72f618868c9960332931d7055a4bff5b3394979a1f5d8089d51c6dc436a121a3d9332d405a3eb3f65fcb8c5930c73606e194782fcf29b46d5e42235de29acc33
-
SSDEEP
384:8dGRmTbW+eO9GXSrtx2MUyQ6JCgf61FDOVV:QzGXaff61FDO7
-
Lumma family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-