Analysis
-
max time kernel
95s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 16:04
Static task
static1
Behavioral task
behavioral1
Sample
Ethelium.exe
Resource
win7-20240903-en
General
-
Target
Ethelium.exe
-
Size
2.8MB
-
MD5
744d976d5410b66062c88e5f91c957c7
-
SHA1
28475d40bdc8522f23d7e20c156f87db0ca6ac1c
-
SHA256
9826dac19113485c882821fe767407955dc8eec684a362f56e05133dd1047c53
-
SHA512
8d1d8e4cb92e6383510f44db1c79ee5d68d936397025685925c6a9418eb9b7518e5473f908c3ce8de4f0e8e672dabc21da6c1d089b402aa570216ae0eca2a380
-
SSDEEP
49152:9g2qPtc1e5OS7bPGoUl+x/grN4azvchYk2AWcAP3l:9vqPCnrN4azvSYFcgl
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ethelium.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1284 Ethelium.exe 1284 Ethelium.exe