General
-
Target
Solara.zip
-
Size
2.8MB
-
Sample
241231-z95ynssnar
-
MD5
0c5525f5bcd0c9610cd6ebf5923dfa41
-
SHA1
df7a895642b88cd99c6e3ddd30d5585778cd866e
-
SHA256
34055dd74bee23c85ea6d2d8649915ed976ee750989c64be9b7b97ff36621d83
-
SHA512
08d66ad5e41f215002e858585a4e3367e5f50102d370f811d0d8a67680ffb66495d40d54196c6e353dacdc87322b2bf38c3f13191d5d3b067b3c4d0deee316dc
-
SSDEEP
49152:nfEkBcsjT/TcQvOVnFjfy/AMWQ1XyGZGhLPJhJkwNmRTsfO+Ykf24/LIzKlbTOUA:hBcsjfFvWFTyZXhfGpJhJ3A5eQkf2UkH
Static task
static1
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Targets
-
-
Target
Solara.zip
-
Size
2.8MB
-
MD5
0c5525f5bcd0c9610cd6ebf5923dfa41
-
SHA1
df7a895642b88cd99c6e3ddd30d5585778cd866e
-
SHA256
34055dd74bee23c85ea6d2d8649915ed976ee750989c64be9b7b97ff36621d83
-
SHA512
08d66ad5e41f215002e858585a4e3367e5f50102d370f811d0d8a67680ffb66495d40d54196c6e353dacdc87322b2bf38c3f13191d5d3b067b3c4d0deee316dc
-
SSDEEP
49152:nfEkBcsjT/TcQvOVnFjfy/AMWQ1XyGZGhLPJhJkwNmRTsfO+Ykf24/LIzKlbTOUA:hBcsjfFvWFTyZXhfGpJhJ3A5eQkf2UkH
-
Lumma family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-