General
-
Target
BakkesModSetup.exe
-
Size
8.3MB
-
Sample
250103-bnqpvswpdr
-
MD5
b2554efc048201c086d7be46f42d00bd
-
SHA1
f6a8986f77c54cce7544d4779a77d878a39ad402
-
SHA256
d4581c971ca9da0b40b609ed356a986b33e4e81289edacd31dc7ab8348a14d20
-
SHA512
6e8ed36e85ee9fbbde577ec0b2a5da6ff71872b6580e2caeffdd34820a502b4a8d8e417087a46fe21ac76bb4a9313f4e4068b06696f8ea4285485ef3f41a01da
-
SSDEEP
196608:AxlS+oStveNjFvtv4jQ0Y4ZLNHDj53lPu6pdWFG:A6+v5cjFvtw00dZLJBNu6Pp
Static task
static1
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://begguinnerz.biz/api
Targets
-
-
Target
BakkesModSetup.exe
-
Size
8.3MB
-
MD5
b2554efc048201c086d7be46f42d00bd
-
SHA1
f6a8986f77c54cce7544d4779a77d878a39ad402
-
SHA256
d4581c971ca9da0b40b609ed356a986b33e4e81289edacd31dc7ab8348a14d20
-
SHA512
6e8ed36e85ee9fbbde577ec0b2a5da6ff71872b6580e2caeffdd34820a502b4a8d8e417087a46fe21ac76bb4a9313f4e4068b06696f8ea4285485ef3f41a01da
-
SSDEEP
196608:AxlS+oStveNjFvtv4jQ0Y4ZLNHDj53lPu6pdWFG:A6+v5cjFvtw00dZLJBNu6Pp
-
Lumma family
-
A potential corporate email address has been identified in the URL: [email protected]
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-