General
-
Target
Ughhiwlsl.exe
-
Size
290KB
-
Sample
250304-d93yesywft
-
MD5
3d7b6e6ec8e0ea92b7ac6d380cf7b689
-
SHA1
90e902eb6d1ce1ec955fce54f695f751b5abe96a
-
SHA256
6232ffd99002b4613913f2a8c03beccb005687c0db190d7f12d7cd841a4d5337
-
SHA512
76ecf6646f0a4bb419e7b5475cf1da614f1f16ffa97e5c3bbff21e41570e973a2018d86908d3a293828472b280052a8bf18f249214cc73f54f284a4334d74b21
-
SSDEEP
6144:N+wQSN+rztLEeUlDgldHcCkTq+FCy5dDuOvOeGJUj:NbhZDKWZ9hv2
Static task
static1
Behavioral task
behavioral1
Sample
Ughhiwlsl.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://wordingvenuo.fun/api
Targets
-
-
Target
Ughhiwlsl.exe
-
Size
290KB
-
MD5
3d7b6e6ec8e0ea92b7ac6d380cf7b689
-
SHA1
90e902eb6d1ce1ec955fce54f695f751b5abe96a
-
SHA256
6232ffd99002b4613913f2a8c03beccb005687c0db190d7f12d7cd841a4d5337
-
SHA512
76ecf6646f0a4bb419e7b5475cf1da614f1f16ffa97e5c3bbff21e41570e973a2018d86908d3a293828472b280052a8bf18f249214cc73f54f284a4334d74b21
-
SSDEEP
6144:N+wQSN+rztLEeUlDgldHcCkTq+FCy5dDuOvOeGJUj:NbhZDKWZ9hv2
-
Lumma family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3