General
-
Target
eb8ee9140516ed888bc9fde920f1753e0e31c53e53a81e939398891a72da01c5.zip
-
Size
12.5MB
-
Sample
250107-acbacstqgw
-
MD5
8f6b28680999dd2eab006ef55f467642
-
SHA1
0656d1a4ff13bf016cc4ae357ef78afb2daa8c36
-
SHA256
eb8ee9140516ed888bc9fde920f1753e0e31c53e53a81e939398891a72da01c5
-
SHA512
3adf016414509a4287d684f0273a25890d5f3692dbd107aa55e6bbe9ebda6eb07babba69404c618ff13722984f6873b6670a2e9a462a60782ecb185592bcd27f
-
SSDEEP
196608:0qwwMYxS0KY8dM5n7FuaDUg8pqIGjZYgkCnWInnjKFnAtyVAEyUX7HJW5cJonE:zMIMdM5n78KjXkCnWIeAXEyUrpW5ZE
Static task
static1
Behavioral task
behavioral1
Sample
eb8ee9140516ed888bc9fde920f1753e0e31c53e53a81e939398891a72da01c5.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
eb8ee9140516ed888bc9fde920f1753e0e31c53e53a81e939398891a72da01c5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Targets
-
-
Target
eb8ee9140516ed888bc9fde920f1753e0e31c53e53a81e939398891a72da01c5.zip
-
Size
12.5MB
-
MD5
8f6b28680999dd2eab006ef55f467642
-
SHA1
0656d1a4ff13bf016cc4ae357ef78afb2daa8c36
-
SHA256
eb8ee9140516ed888bc9fde920f1753e0e31c53e53a81e939398891a72da01c5
-
SHA512
3adf016414509a4287d684f0273a25890d5f3692dbd107aa55e6bbe9ebda6eb07babba69404c618ff13722984f6873b6670a2e9a462a60782ecb185592bcd27f
-
SSDEEP
196608:0qwwMYxS0KY8dM5n7FuaDUg8pqIGjZYgkCnWInnjKFnAtyVAEyUX7HJW5cJonE:zMIMdM5n78KjXkCnWIeAXEyUrpW5ZE
Score10/10-
Lumma family
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-