General
-
Target
736d94d331cf5d6a2cc45f4743132008.bin
-
Size
1.0MB
-
Sample
250103-bpqfgswqaj
-
MD5
18e0f2368596b7af247bfcc15ab0c783
-
SHA1
c7a2d36b5a7a404bc2ee6dcdae13ff2bd61c68f3
-
SHA256
44335da86f8963090387996bda66ed9207b183b6eca912a64c1ef7e8a057e9ff
-
SHA512
23646411db92a98123a6a203f950bdca3b2130e4fe9ecb7c62e5e657ab1e2b707f38b120277f510d4a8daaa966b2c96d1cbf23fa66aa0f83f6ae5a797adcd97e
-
SSDEEP
24576:fmLqfgX6A96JX2mGXx0yBqVIIUZhBG4JyTKB5hg5ZqtBx:fmL5qq6JXyx0KBG4Ja8aqtBx
Static task
static1
Behavioral task
behavioral1
Sample
b630b19ccd0acb4fda6404610f1cd7df0c71849f2c9dca42ce5df9779f96db47.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Targets
-
-
Target
b630b19ccd0acb4fda6404610f1cd7df0c71849f2c9dca42ce5df9779f96db47.exe
-
Size
1.1MB
-
MD5
736d94d331cf5d6a2cc45f4743132008
-
SHA1
0b55e71db47a40ef5b4f9f2068dd26fa64b898b2
-
SHA256
b630b19ccd0acb4fda6404610f1cd7df0c71849f2c9dca42ce5df9779f96db47
-
SHA512
ecbcc0159cbf45a094cf887293a7b77a3f8d79dda61a7a59fd164a5bc4f8398c1fd6f2cf429fd0d25644df0b211768fb417bba790a113eb23d5e295dbb5018bb
-
SSDEEP
24576:mdnMao5l87bHiMAD+YW47CU/q+cbrrE6TaxX3mJVGlZkmrK:6Iivgr7C/bv2d3mzGHkmrK
-
Lumma family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates processes with tasklist
-