General
-
Target
32f7fa32fafc74bb0b26089e37a7fde1.exe
-
Size
8.0MB
-
Sample
250415-sd3p4swlt5
-
MD5
32f7fa32fafc74bb0b26089e37a7fde1
-
SHA1
f608bb9d9ba24bc86db2436e612bb84f31be2e97
-
SHA256
c5308205d4d84ddc2a96194fcc509522ada976c3f5ee60e4208008ede1935359
-
SHA512
1f31bdced9547fe0a29357b182a9a74e951ecefa17122d978e78cde6b1ea5b1cdf58f902508869f5590955cd23501e92aa0aac216226afed08c33655e02302d7
-
SSDEEP
98304:IT5sez3ygCjCjSmJNb/KyVdBAJ1Jbho2a6FmI3oqmG:IyeDycSmJNb//rMJbI6P3e
Static task
static1
Behavioral task
behavioral1
Sample
32f7fa32fafc74bb0b26089e37a7fde1.exe
Resource
win10v2004-20250410-en
Malware Config
Extracted
gcleaner
185.156.73.98
45.91.200.135
Extracted
lumma
https://proenhann.digital/thnb
https://jawdedmirror.run/ewqd
https://changeaie.top/geps
https://lonfgshadow.live/xawi
https://liftally.top/xasj
https://nighetwhisper.top/lekd
https://salaccgfa.top/gsooz
https://zestmodp.top/zeda
https://owlflright.digital/qopy
Targets
-
-
Target
32f7fa32fafc74bb0b26089e37a7fde1.exe
-
Size
8.0MB
-
MD5
32f7fa32fafc74bb0b26089e37a7fde1
-
SHA1
f608bb9d9ba24bc86db2436e612bb84f31be2e97
-
SHA256
c5308205d4d84ddc2a96194fcc509522ada976c3f5ee60e4208008ede1935359
-
SHA512
1f31bdced9547fe0a29357b182a9a74e951ecefa17122d978e78cde6b1ea5b1cdf58f902508869f5590955cd23501e92aa0aac216226afed08c33655e02302d7
-
SSDEEP
98304:IT5sez3ygCjCjSmJNb/KyVdBAJ1Jbho2a6FmI3oqmG:IyeDycSmJNb//rMJbI6P3e
-
Detect Socks5Systemz Payload
-
Gcleaner family
-
Lumma family
-
Socks5systemz family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3