Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 10:41
Static task
static1
Behavioral task
behavioral1
Sample
fghj.exe
Resource
win7-20241010-en
General
-
Target
fghj.exe
-
Size
3.1MB
-
MD5
549e550f48b48de65c69c4e87bffaa00
-
SHA1
ff5914ba3411ba52049f9cec0b7c5267d2f7015a
-
SHA256
b4129afa37522ee77ca932eb2f29c16df3ad47dc6cc52864ef488fbb537296e2
-
SHA512
de2a949ae9ce6f6b80cccea0ae0b7ebd997df54cfc697285c52220ee42d7294d8b9202bc7edece9241b8b6bf7215365608bc704d2cfe636dd528eb2d03320586
-
SSDEEP
98304:R5tGWuHhHh+oGqWy9zLyj3y5Jmpb3wUgzE:R5UWAhlGqpJyjxpbAUgw
Malware Config
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
https://spellshagey.biz/api
Signatures
-
Lumma family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fghj.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1520 fghj.exe 1520 fghj.exe