Overview
overview
10Static
static
10deljack-ma...wr.exe
windows10-ltsc_2021-x64
10deljack-ma...oo.exe
windows10-ltsc_2021-x64
10deljack-ma...dd.exe
windows10-ltsc_2021-x64
10deljack-ma...df.exe
windows10-ltsc_2021-x64
10deljack-ma...da.exe
windows10-ltsc_2021-x64
10deljack-ma...pp.exe
windows10-ltsc_2021-x64
8deljack-ma...aa.exe
windows10-ltsc_2021-x64
7Analysis
-
max time kernel
103s -
max time network
141s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
28/03/2025, 14:31
Behavioral task
behavioral1
Sample
deljack-main/brityjaldjthjawr.exe
Resource
win10ltsc2021-20250313-en
Behavioral task
behavioral2
Sample
deljack-main/bvnrfiseooo.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
deljack-main/gfdthawdddd.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
deljack-main/lcnbktiaiortaaewdf.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral5
Sample
deljack-main/mnboeplalda.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral6
Sample
deljack-main/nbotpasppp.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral7
Sample
deljack-main/tkskfaaa.exe
Resource
win10ltsc2021-20250314-en
General
-
Target
deljack-main/bvnrfiseooo.exe
-
Size
1.3MB
-
MD5
6c0a58860101f0fe49d2cebbb48b4a2d
-
SHA1
abd205c27b8826c1b0465d0253b3cddc7f44f848
-
SHA256
6a4188c8517890210a357a427264d5f451f416150e2c9a772e5884709fcd1bdf
-
SHA512
b36696bb36394ec869c26d2a537b262001ce0fc6b71dc9dc19bf96566e24f3abd5a33351eadd2711b09013a176f3c564080f269a9da05bbc2f7d6e40edf5bc78
-
SSDEEP
24576:KbGt6QOlobhDf0JmHcaKAoMIDF160mZTbwcVyIfgAWW9:7trOGloinoMsF160mZrVDfd
Malware Config
Extracted
lumma
https://tripperxe.live/LSLkao
https://aoreheatq.live/gsopp
https://castmaxw.run/ganzde
https://weldorae.digital/geds
https://steelixr.live/aguiz
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://smeltingt.run/giiaus
https://ferromny.digital/gwpd
Signatures
-
Lumma family
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3452 bvnrfiseooo.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bvnrfiseooo.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3452 bvnrfiseooo.exe 3452 bvnrfiseooo.exe 3452 bvnrfiseooo.exe 3452 bvnrfiseooo.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3452 bvnrfiseooo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\deljack-main\bvnrfiseooo.exe"C:\Users\Admin\AppData\Local\Temp\deljack-main\bvnrfiseooo.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3452