Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 00:03
Static task
static1
Behavioral task
behavioral1
Sample
large PF File.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
large PF File.exe
Resource
win10v2004-20241007-en
General
-
Target
large PF File.exe
-
Size
704.0MB
-
MD5
7d2aeb8f853a52c4d95c3ce09b5d0f68
-
SHA1
3e75e55b6cef5921de718ac6de0a825449c8e6d9
-
SHA256
889fa5d3887c594b193b7288c0b5ee51383e94e1f2f5c731e333ed094fa5b291
-
SHA512
4b0873adfe744586dd8d30099154423c9ae97cae97087a0eb6fcae0873e40844fbb2562a279577de321cd8005ce85720d8d717bddaf1001a2f37673617ad7605
-
SSDEEP
49152:7dx4HDQNJL0UR6SgMt+k4RiP+RmXMjiINiMq95FoHVHNTQTEj3333wI+RrTK0S:gHDYrqiPRhINnq95FoHVB3333CRrO3
Malware Config
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
Signatures
-
Lumma family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language large PF File.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2556 large PF File.exe