General
-
Target
Upd_156_983_15.msi
-
Size
1.3MB
-
Sample
250114-xqk32swmdx
-
MD5
0cd2b95df897bd2037edff092699e169
-
SHA1
18c5d3394d9260c2641e06a58847b7a2818b8174
-
SHA256
3e50b308a6366677b3fed9579f8f13dc721ae30b1534591c0ce5e083c1923a9f
-
SHA512
b3015d2beb30d841f0fc1a46baf7b56664c23e10538b519b791d9cc9fc86602811d52eb328c3d7e0832d5dece0019e01985e0e97a63037217574e475f93c95b1
-
SSDEEP
24576:3z+Xe8tCex83Si8UCROEYG3VKcoBR9RXawxz6X3pvtL7rPVU6fB6bAogJQOVe:3D8tCq83KFROEUcoBRqwxMpvt/rPVRB8
Static task
static1
Behavioral task
behavioral1
Sample
Upd_156_983_15.msi
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Upd_156_983_15.msi
Resource
win10v2004-20241007-en
Malware Config
Extracted
lumma
https://handlequarte.shop/api
Targets
-
-
Target
Upd_156_983_15.msi
-
Size
1.3MB
-
MD5
0cd2b95df897bd2037edff092699e169
-
SHA1
18c5d3394d9260c2641e06a58847b7a2818b8174
-
SHA256
3e50b308a6366677b3fed9579f8f13dc721ae30b1534591c0ce5e083c1923a9f
-
SHA512
b3015d2beb30d841f0fc1a46baf7b56664c23e10538b519b791d9cc9fc86602811d52eb328c3d7e0832d5dece0019e01985e0e97a63037217574e475f93c95b1
-
SSDEEP
24576:3z+Xe8tCex83Si8UCROEYG3VKcoBR9RXawxz6X3pvtL7rPVU6fB6bAogJQOVe:3D8tCq83KFROEUcoBRqwxMpvt/rPVRB8
-
Lumma family
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1System Binary Proxy Execution
1Msiexec
1