General
-
Target
title.mp4.hta
-
Size
2.6MB
-
Sample
250106-p47j7sxjcs
-
MD5
5ffa4145e79128ab1c56abfb5a8455d7
-
SHA1
e8cec6950853414976683615b1467b1d4dae8ee6
-
SHA256
3cf8f04202e09ddfff4c1febc10873a38258116fadd806ce1110f36445bbeaf0
-
SHA512
b0c4356886e40cc9dce4eb2c0918ed4ef88dc9ef7441963d89ff3c0790d2e49b3319ea3a26094a496350163eb98f39888822bbf67530e38a5bd32a427e7884c1
-
SSDEEP
49152:SSQwzfrpqz053/ySQwzfrpqzoSQwzfrpqzoSQwzfrpqzd:SgIVgIsgI0gIR
Static task
static1
Behavioral task
behavioral1
Sample
title.mp4.hta
Resource
win7-20241023-en
Malware Config
Extracted
https://cabf.klipdesak.shop/smugle.bd
Extracted
lumma
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
Targets
-
-
Target
title.mp4.hta
-
Size
2.6MB
-
MD5
5ffa4145e79128ab1c56abfb5a8455d7
-
SHA1
e8cec6950853414976683615b1467b1d4dae8ee6
-
SHA256
3cf8f04202e09ddfff4c1febc10873a38258116fadd806ce1110f36445bbeaf0
-
SHA512
b0c4356886e40cc9dce4eb2c0918ed4ef88dc9ef7441963d89ff3c0790d2e49b3319ea3a26094a496350163eb98f39888822bbf67530e38a5bd32a427e7884c1
-
SSDEEP
49152:SSQwzfrpqz053/ySQwzfrpqzoSQwzfrpqzoSQwzfrpqzd:SgIVgIsgI0gIR
-
Lumma family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-