General
-
Target
8ab19998dc86c27d89cf727862b67a397c5fcba459c86dac1f3415985ff98604.exe
-
Size
18.6MB
-
Sample
250305-dlm73axkt4
-
MD5
b0bd2ee74ee6a80bdaf7227aee5fe33a
-
SHA1
aaf9f4ac8dc4548367840e3ea6d48bd4035da36a
-
SHA256
8ab19998dc86c27d89cf727862b67a397c5fcba459c86dac1f3415985ff98604
-
SHA512
cfe337cefd297b56ac0ac8726d36e170ce1b4479f6fc7899c7b389b860d422a38d9cf4823188f5b1e423bbe066a4dc9d68ea299490260d0c5c876639dc17e52e
-
SSDEEP
393216:iwU56qSfqFt7ju2tx+zIhCI27gLH0sDziV:iUSv7y2tx+zIhCI27gD0BV
Static task
static1
Behavioral task
behavioral1
Sample
8ab19998dc86c27d89cf727862b67a397c5fcba459c86dac1f3415985ff98604.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8ab19998dc86c27d89cf727862b67a397c5fcba459c86dac1f3415985ff98604.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
lumma
https://pddinghenarkijui.shop/api
Targets
-
-
Target
8ab19998dc86c27d89cf727862b67a397c5fcba459c86dac1f3415985ff98604.exe
-
Size
18.6MB
-
MD5
b0bd2ee74ee6a80bdaf7227aee5fe33a
-
SHA1
aaf9f4ac8dc4548367840e3ea6d48bd4035da36a
-
SHA256
8ab19998dc86c27d89cf727862b67a397c5fcba459c86dac1f3415985ff98604
-
SHA512
cfe337cefd297b56ac0ac8726d36e170ce1b4479f6fc7899c7b389b860d422a38d9cf4823188f5b1e423bbe066a4dc9d68ea299490260d0c5c876639dc17e52e
-
SSDEEP
393216:iwU56qSfqFt7ju2tx+zIhCI27gLH0sDziV:iUSv7y2tx+zIhCI27gD0BV
-
Lumma family
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3