General
-
Target
bb035bd88ef10bfa2776a3182246d1f7a92dbd2354c90d0559ac49c90b73b917.zip
-
Size
3.5MB
-
Sample
250107-ac9g6avkgw
-
MD5
804ccc6f904756d4b96b1ac090e14902
-
SHA1
9616d4668249548716a64e0f9c735c30f3355ad4
-
SHA256
bb035bd88ef10bfa2776a3182246d1f7a92dbd2354c90d0559ac49c90b73b917
-
SHA512
c01056442a985308d86adaa6de32cd894901290aa8648766eab3303a996f9efaa6617e718201f88fd5448bb6f68349d0bedff525642978039b63faf01b61509d
-
SSDEEP
98304:h2n6ghelC44WGE4TVkjqUBRuQq7BPiNv:a6gkT7GnT+jqUBRxq7Bsv
Static task
static1
Behavioral task
behavioral1
Sample
bb035bd88ef10bfa2776a3182246d1f7a92dbd2354c90d0559ac49c90b73b917.msi
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bb035bd88ef10bfa2776a3182246d1f7a92dbd2354c90d0559ac49c90b73b917.msi
Resource
win10v2004-20241007-en
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Targets
-
-
Target
bb035bd88ef10bfa2776a3182246d1f7a92dbd2354c90d0559ac49c90b73b917.zip
-
Size
3.5MB
-
MD5
804ccc6f904756d4b96b1ac090e14902
-
SHA1
9616d4668249548716a64e0f9c735c30f3355ad4
-
SHA256
bb035bd88ef10bfa2776a3182246d1f7a92dbd2354c90d0559ac49c90b73b917
-
SHA512
c01056442a985308d86adaa6de32cd894901290aa8648766eab3303a996f9efaa6617e718201f88fd5448bb6f68349d0bedff525642978039b63faf01b61509d
-
SSDEEP
98304:h2n6ghelC44WGE4TVkjqUBRuQq7BPiNv:a6gkT7GnT+jqUBRxq7Bsv
-
Lumma family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-