General
-
Target
SoftV10.16.zip
-
Size
54.7MB
-
Sample
250410-t88ehsxvav
-
MD5
2b4fbe0df60ebec2ff0954762b4a5fde
-
SHA1
ddc6ec51c8681eaa65edeb259ce4eede6272cab7
-
SHA256
573adec2017ad15a98161a9aa7c9d80e526af74bb87c73616512c8f3a98966c4
-
SHA512
5fd7033af6b9306d7d632047a5558f71a22a1acab2ea0a4dae498550cf60b8ca5a8b7dc8067033c58541a7d95492031aba2875824b375ce98ade110a6e41a07d
-
SSDEEP
1572864:TlYTTJC5XR597XxJR578+tVAJsch4UrwHA4Kx:TliJC5XR597hZ78+EJseUzKx
Static task
static1
Malware Config
Extracted
lumma
https://flourishfo.run/ayuio
https://soursopsf.run/gsoiao
https://changeaie.top/geps
https://easyupgw.live/eosz
https://liftally.top/xasj
https://upmodini.digital/gokk
https://salaccgfa.top/gsooz
https://zestmodp.top/zeda
https://xcelmodo.run/nahd
Targets
-
-
Target
SoftV10.16.zip
-
Size
54.7MB
-
MD5
2b4fbe0df60ebec2ff0954762b4a5fde
-
SHA1
ddc6ec51c8681eaa65edeb259ce4eede6272cab7
-
SHA256
573adec2017ad15a98161a9aa7c9d80e526af74bb87c73616512c8f3a98966c4
-
SHA512
5fd7033af6b9306d7d632047a5558f71a22a1acab2ea0a4dae498550cf60b8ca5a8b7dc8067033c58541a7d95492031aba2875824b375ce98ade110a6e41a07d
-
SSDEEP
1572864:TlYTTJC5XR597XxJR578+tVAJsch4UrwHA4Kx:TliJC5XR597hZ78+EJseUzKx
-
Lumma family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v16
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3