General
-
Target
b6aeaa9504f00fac2d435ae3a419153df0000681def7d87839b47265b1391349.zip
-
Size
730KB
-
Sample
250118-rd11vavnfs
-
MD5
75ea2f77a9c534ae24c5241ce8d0fa5f
-
SHA1
9fdd0b79e822757e40f96876a01830e769361e1a
-
SHA256
70dd0e733bfb7ad587d5766a4905288aa4912e81bc499268e31776a805cb20a3
-
SHA512
e22b9034a69233acaf5bb21cf3ea416ff370bb3fde35bececa2a77d89f1ec1bc8d859774514cb04254c7e2f17d901b2f2f3f361d2cce4e04acca6174870d2ec0
-
SSDEEP
12288:QD5Lp+lz85/G+Lai4qY1NyWh83kpFNVTU67wCpNoJWRwhCwe6zkSel1LxBb:I5Lcli/G+L4qWNy13kpFNVTZbLaCzQk9
Static task
static1
Behavioral task
behavioral1
Sample
b6aeaa9504f00fac2d435ae3a419153df0000681def7d87839b47265b1391349.exe
Resource
win11-20241007-en
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Targets
-
-
Target
b6aeaa9504f00fac2d435ae3a419153df0000681def7d87839b47265b1391349.exe
-
Size
1.2MB
-
MD5
ac155134de0e4073ffc1fc3c4331d49f
-
SHA1
5f376da75612a3ea2340693820ecc0f92d857b18
-
SHA256
b6aeaa9504f00fac2d435ae3a419153df0000681def7d87839b47265b1391349
-
SHA512
584aeee314e0eab71870dadc1ae32d0e6b67de9a89f13081c7e30672f37c5f6f7da50a5eb71c68110adb6327c83a24c0ca4fa67b8e1cbc4950ff370594845918
-
SSDEEP
24576:7QfT6WUppc/rPx37/zHBA6plp+51CEr3a8JFUDmx9MN5dz6Za0Mb2Ohpt2l:ONrPx37/zHBA6pGPK6xMzApM6
-
Lumma family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
5Change Default File Association
1Component Object Model Hijacking
1Image File Execution Options Injection
1Installer Packages
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
5Change Default File Association
1Component Object Model Hijacking
1Image File Execution Options Injection
1Installer Packages
1Netsh Helper DLL
1Defense Evasion
Modify Registry
5Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1System Binary Proxy Execution
1Msiexec
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1