General
-
Target
vail-vr-trainer
-
Size
85KB
-
Sample
250111-hnjd4szkds
-
MD5
485dfb58e1c3ba1b96766a68a0577c83
-
SHA1
20c523144397240616b4e843a35822c5f91adb8a
-
SHA256
4d92578b8c66bec39e89c8f6401339a60285763f2543277a8192d9365b026ea5
-
SHA512
3d5a71f76f311bc62eaa67c79c2ef22f5f3c355e138b17f7b4fab09ae6012df2f4bd8c6d5215b6db3edf5e70a9319a73e9533a51d4d1fb80d9d1798f8f742593
-
SSDEEP
1536:SqfapeXQ6ihUII7CMxL9II9yWxoO6CF29FCmd7P4bQy1PyhdygjAV63mMH0LCoxh:HSoWyCM1RyWqO6CF29FCmd7P4bQy1Pya
Static task
static1
Behavioral task
behavioral1
Sample
vail-vr-trainer.html
Resource
win10v2004-20241007-en
Malware Config
Extracted
lumma
https://enthuasticsa.cyou/api
https://fraggielek.biz/api
https://grandiouseziu.biz/api
https://littlenotii.biz/api
https://marketlumpe.biz/api
https://nuttyshopr.biz/api
https://punishzement.biz/api
https://spookycappy.biz/api
https://truculengisau.biz/api
Targets
-
-
Target
vail-vr-trainer
-
Size
85KB
-
MD5
485dfb58e1c3ba1b96766a68a0577c83
-
SHA1
20c523144397240616b4e843a35822c5f91adb8a
-
SHA256
4d92578b8c66bec39e89c8f6401339a60285763f2543277a8192d9365b026ea5
-
SHA512
3d5a71f76f311bc62eaa67c79c2ef22f5f3c355e138b17f7b4fab09ae6012df2f4bd8c6d5215b6db3edf5e70a9319a73e9533a51d4d1fb80d9d1798f8f742593
-
SSDEEP
1536:SqfapeXQ6ihUII7CMxL9II9yWxoO6CF29FCmd7P4bQy1PyhdygjAV63mMH0LCoxh:HSoWyCM1RyWqO6CF29FCmd7P4bQy1Pya
-
Lumma family
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-