General
-
Target
appFile.exe
-
Size
36.2MB
-
Sample
250110-l984fa1pbs
-
MD5
8e9470197062cc090f733b985f2de5d4
-
SHA1
d99fa5c8ee7edb80ffcdf6e777b43e08d5456103
-
SHA256
aba80a73b34a6fee80168217a4642f618aadd7f97803bb57242025068da3ce7b
-
SHA512
1e5ea1524f94b28dc5677b234d16d10df5e66396d0a82b512267fc8a966cf7b757b3e2a3f6b03cecd7f0ad9962580b4588e602f4e342467341923bbb70ccc8ce
-
SSDEEP
393216:UYOpceiJ1z1bAISY9rMTlSd7JZnNXjFexpRWWy8ElyftIusM2yIdc11Av/NElH4u:wcegRb3gsXNG118ptLwClC
Static task
static1
Behavioral task
behavioral1
Sample
appFile.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://robinsharez.shop/api
https://handscreamny.shop/api
https://chipdonkeruz.shop/api
https://versersleep.shop/api
https://crowdwarek.shop/api
https://apporholis.shop/api
https://femalsabler.shop/api
https://soundtappysk.shop/api
https://breathauthorit.cyou/api
Targets
-
-
Target
appFile.exe
-
Size
36.2MB
-
MD5
8e9470197062cc090f733b985f2de5d4
-
SHA1
d99fa5c8ee7edb80ffcdf6e777b43e08d5456103
-
SHA256
aba80a73b34a6fee80168217a4642f618aadd7f97803bb57242025068da3ce7b
-
SHA512
1e5ea1524f94b28dc5677b234d16d10df5e66396d0a82b512267fc8a966cf7b757b3e2a3f6b03cecd7f0ad9962580b4588e602f4e342467341923bbb70ccc8ce
-
SSDEEP
393216:UYOpceiJ1z1bAISY9rMTlSd7JZnNXjFexpRWWy8ElyftIusM2yIdc11Av/NElH4u:wcegRb3gsXNG118ptLwClC
-
Lumma family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates processes with tasklist
-