General
-
Target
Untitled design.png
-
Size
183KB
-
Sample
250110-3njp4awkel
-
MD5
bd8092e24f639ed1fbaa87745db569d0
-
SHA1
15f7c9d155057a2660985157d464a733eea9c395
-
SHA256
76fe2a70d764e2dec6639ba33f9f6fa1e94b7be3108b1b08022ea768a158fd84
-
SHA512
1ddd6b9a8053a4e3033abb20617e999c9d4c7546123191ff4fc3813f0a7bb66d820fd8ec36de5c7234fd9f689b2def217550ba161966d9afed26586edf24ec73
-
SSDEEP
3072:OOJbFhztEHNFIwY8zTsP2Q83cTPxoDepexSGhDMKGNQJYW1lWQrTyBLwLL6:OitWiwY8zAPo+PxoDosDhgKGCSW1F6th
Static task
static1
Behavioral task
behavioral1
Sample
Untitled design.png
Resource
win11-20241007-en
Malware Config
Extracted
lumma
https://robinsharez.shop/api
https://handscreamny.shop/api
https://chipdonkeruz.shop/api
https://versersleep.shop/api
https://crowdwarek.shop/api
https://apporholis.shop/api
https://femalsabler.shop/api
https://soundtappysk.shop/api
https://bashusolici.sbs/api
Targets
-
-
Target
Untitled design.png
-
Size
183KB
-
MD5
bd8092e24f639ed1fbaa87745db569d0
-
SHA1
15f7c9d155057a2660985157d464a733eea9c395
-
SHA256
76fe2a70d764e2dec6639ba33f9f6fa1e94b7be3108b1b08022ea768a158fd84
-
SHA512
1ddd6b9a8053a4e3033abb20617e999c9d4c7546123191ff4fc3813f0a7bb66d820fd8ec36de5c7234fd9f689b2def217550ba161966d9afed26586edf24ec73
-
SSDEEP
3072:OOJbFhztEHNFIwY8zTsP2Q83cTPxoDepexSGhDMKGNQJYW1lWQrTyBLwLL6:OitWiwY8zAPo+PxoDosDhgKGCSW1F6th
Score10/10-
Lumma family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-