Overview
overview
10Static
static
10deljack-ma...wr.exe
windows10-ltsc_2021-x64
10deljack-ma...oo.exe
windows10-ltsc_2021-x64
10deljack-ma...dd.exe
windows10-ltsc_2021-x64
10deljack-ma...df.exe
windows10-ltsc_2021-x64
10deljack-ma...da.exe
windows10-ltsc_2021-x64
10deljack-ma...pp.exe
windows10-ltsc_2021-x64
8deljack-ma...aa.exe
windows10-ltsc_2021-x64
7Analysis
-
max time kernel
103s -
max time network
142s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
28/03/2025, 14:31
Behavioral task
behavioral1
Sample
deljack-main/brityjaldjthjawr.exe
Resource
win10ltsc2021-20250313-en
Behavioral task
behavioral2
Sample
deljack-main/bvnrfiseooo.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
deljack-main/gfdthawdddd.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
deljack-main/lcnbktiaiortaaewdf.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral5
Sample
deljack-main/mnboeplalda.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral6
Sample
deljack-main/nbotpasppp.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral7
Sample
deljack-main/tkskfaaa.exe
Resource
win10ltsc2021-20250314-en
General
-
Target
deljack-main/mnboeplalda.exe
-
Size
1.2MB
-
MD5
39e60bb5a88e48e64f5be20f42a67f3c
-
SHA1
6bb7001491c140f7635b1a42b6e4c90a06fd7290
-
SHA256
b4d67fe310716191996f65c78eff2594c23dd1bbb076ad22be9c3513179c78a6
-
SHA512
246211d42b96f236be4a114873f539a6d0f663bbfae2638516104e8ad05b0fb0bbfb1a849f5670a18932652320e36a7eba445e88d150ddb4a1c53f9078e9ab21
-
SSDEEP
24576:kfqSVbjBtN5U6qxs5Hm2I0wVzFHsH3YQFBTjymQEVVMwkR9q9S:kd1BtGIHm2I0KFYY4I909S
Malware Config
Extracted
lumma
https://axistechw.live/GOaOAp
https://eoreheatq.live/gsopp
https://castmaxw.run/ganzde
https://weldorae.digital/geds
https://steelixr.live/aguiz
https://m9advennture.top/GKsiio
https://-targett.top/dsANGt
https://smeltingt.run/giiaus
https://ferromny.digital/gwpd
Signatures
-
Lumma family
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 936 mnboeplalda.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mnboeplalda.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 936 mnboeplalda.exe 936 mnboeplalda.exe 936 mnboeplalda.exe 936 mnboeplalda.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 936 mnboeplalda.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\deljack-main\mnboeplalda.exe"C:\Users\Admin\AppData\Local\Temp\deljack-main\mnboeplalda.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:936