General
-
Target
7003027ab2a059240e80ef85195a74cdb601c96263a99835a3a746d294033865.zip
-
Size
9.1MB
-
Sample
250107-acl2vstrgx
-
MD5
3a9ec2adcf2e5a8d607cb8162235781b
-
SHA1
468ba4e5c02a507010f6c2b6d64a6a4b090e613d
-
SHA256
7003027ab2a059240e80ef85195a74cdb601c96263a99835a3a746d294033865
-
SHA512
cae42e54e77b780e0e7e53091d14eca37c54a165e8eecf4b68278ee53f48837ae35ff7ef7d4fe4720c5cced8383e1f727d027ae1d6223ae1afccb9d199a21a38
-
SSDEEP
196608:tsjGwzG3DXh7YF3qlXT1u5CgX3FFd3T+u9M4xAiDa9sfpp:tsGlh75u5XHF/3T+0MWBp
Static task
static1
Behavioral task
behavioral1
Sample
keygen pl7 pro v4 5.exe
Resource
win7-20240708-en
Malware Config
Extracted
lumma
https://detailshaeje.cfd/api
Targets
-
-
Target
keygen pl7 pro v4 5.exe
-
Size
867.2MB
-
MD5
edf30ffa29debe70cba82d686c473177
-
SHA1
05a0f303c1263cb58cf9367e50dc248f01d9bd6c
-
SHA256
ca3636c22f2c69d18cc47309aac0450f6b9dd62f175d4994d4652dc2ee29317e
-
SHA512
9aadc6398da79e8e26081221613ac4a530b6dbff7533c5cdca1f7dba2ec2c349ce104518038914ccc2e4e413f2abd5c5bf3381b4319fea554775ef9fcbd3efb8
-
SSDEEP
393216:1tVrjTLh6DD8z3Pn9wsh+JSgrl0yUeNQVdt5HKOy2:7G7yVnp
-
Lumma family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-