Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2025 18:19
Behavioral task
behavioral1
Sample
Crypteddd.exe
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
Crypteddd.exe
-
Size
154KB
-
MD5
5deb5c8c278faad33b6408ea072c8068
-
SHA1
4f4ecc62573f441851a81a00c97236f103c08f2c
-
SHA256
8e5d2b4093bd4fb583ebdc07139472a75cc7ad4440d2d6b5210986a70fd75d38
-
SHA512
3374dd60d120c46bba06be1f4be71dfa5c46239114b81aa1e6e3bcc4c9f578b6f75e99c0cff4461956dd536d7349cf20ce54313232b0509c509b982d5b5a8c53
-
SSDEEP
3072:YNV66VBT+g2dzD/0b+US6XiDMcDUI+z4X8qfh4uZtxw+GwX1hy00WWmfEad:C6KQg2N/0CUSsiDMc0zhOhrZtx7Gihy2
Malware Config
Extracted
Family
lumma
C2
https://showpanicke.shop/api
Signatures
-
Lumma family
-
resource yara_rule behavioral2/memory/1208-0-0x0000000000370000-0x00000000003CE000-memory.dmp upx behavioral2/memory/1208-1-0x0000000000370000-0x00000000003CE000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crypteddd.exe