Analysis
-
max time kernel
25s -
max time network
28s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 03:45
Static task
static1
Behavioral task
behavioral1
Sample
RelesseBoostrappers/PodD/libGLESv2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
RelesseBoostrappers/PodD/libGLESv2.dll
Resource
win11-20241023-en
Behavioral task
behavioral3
Sample
RelesseBoostrappers/Solara-Set-upX.exe
Resource
win10v2004-20241007-en
General
-
Target
RelesseBoostrappers/Solara-Set-upX.exe
-
Size
4.2MB
-
MD5
04602651f127a19f43bfcad57514d552
-
SHA1
2c8a0b841bdab3b5c77794a2bad2be1e08d29d86
-
SHA256
a6e4e665ebfe59d7bf884c1750bcdd8cddb77fb537e9d1018efe28abf8945d53
-
SHA512
ddca046391d6318e80b7fdfe335cbbf26ed53ba6f8e2b632aefba1fc34385790fff0a6ac52406fffa7d0a7ab20e25ba1833956a826ff03851b6c80467852db9b
-
SSDEEP
49152:sF5wI7dkhv9jD0IdxD5aSs1Uc4ZZS5IAf/kpYHG:s4wkDGkpYHG
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://scaredsensa.sbs/api
Extracted
lumma
https://scaredsensa.sbs/api
Signatures
-
Lumma family
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara-Set-upX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara-Set-upX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara-Set-upX.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3572 Solara-Set-upX.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RelesseBoostrappers\Solara-Set-upX.exe"C:\Users\Admin\AppData\Local\Temp\RelesseBoostrappers\Solara-Set-upX.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:3572
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\RelesseBoostrappers\Solara-Set-upX.exe"C:\Users\Admin\AppData\Local\Temp\RelesseBoostrappers\Solara-Set-upX.exe"1⤵
- System Location Discovery: System Language Discovery
PID:216
-
C:\Users\Admin\AppData\Local\Temp\RelesseBoostrappers\Solara-Set-upX.exe"C:\Users\Admin\AppData\Local\Temp\RelesseBoostrappers\Solara-Set-upX.exe"1⤵
- System Location Discovery: System Language Discovery
PID:116