Overview
overview
10Static
static
10deljack-ma...wr.exe
windows10-ltsc_2021-x64
10deljack-ma...oo.exe
windows10-ltsc_2021-x64
10deljack-ma...dd.exe
windows10-ltsc_2021-x64
10deljack-ma...df.exe
windows10-ltsc_2021-x64
10deljack-ma...da.exe
windows10-ltsc_2021-x64
10deljack-ma...pp.exe
windows10-ltsc_2021-x64
8deljack-ma...aa.exe
windows10-ltsc_2021-x64
7Analysis
-
max time kernel
103s -
max time network
144s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250313-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250313-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
28/03/2025, 14:31
Behavioral task
behavioral1
Sample
deljack-main/brityjaldjthjawr.exe
Resource
win10ltsc2021-20250313-en
Behavioral task
behavioral2
Sample
deljack-main/bvnrfiseooo.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
deljack-main/gfdthawdddd.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
deljack-main/lcnbktiaiortaaewdf.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral5
Sample
deljack-main/mnboeplalda.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral6
Sample
deljack-main/nbotpasppp.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral7
Sample
deljack-main/tkskfaaa.exe
Resource
win10ltsc2021-20250314-en
General
-
Target
deljack-main/brityjaldjthjawr.exe
-
Size
1.3MB
-
MD5
76cda2fc84b8ef590b020fffb3c3c8b4
-
SHA1
56e0056893aef76fedf37440b22da5a156fda426
-
SHA256
6b1d1a19c6c43e2a3fd4fd9ea74edf7f57b889ddf70d66ab8bb028af33f14bfa
-
SHA512
4a1804b7cafbe6334a31c2bf1024fe3505f7f6c96ac5a0a21c48715f7597dd78ad4b7d4baf8afbef5597988fd6b72f91e24b3482672a57c3c58fdfb2f6f81a1d
-
SSDEEP
24576:0iqxfRCNMIAMb4W9Gdz5drGMR03gGM4xsWjADUgjcQXWm8:jfJABW9GdVlGMogwMXjDXl8
Malware Config
Extracted
lumma
https://advennture.top/GKsiio
https://oreheatq.live/gsopp
https://castmaxw.run/ganzde
https://weldorae.digital/geds
https://steelixr.live/aguiz
https://targett.top/dsANGt
https://8smeltingt.run/giiaus
https://ferromny.digital/gwpd
Signatures
-
Lumma family
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4492 brityjaldjthjawr.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language brityjaldjthjawr.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4492 brityjaldjthjawr.exe 4492 brityjaldjthjawr.exe 4492 brityjaldjthjawr.exe 4492 brityjaldjthjawr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4492 brityjaldjthjawr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\deljack-main\brityjaldjthjawr.exe"C:\Users\Admin\AppData\Local\Temp\deljack-main\brityjaldjthjawr.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4492