Analysis

  • max time kernel
    101s
  • max time network
    104s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250410-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250410-enlocale:en-usos:windows10-ltsc_2021-x64system
  • submitted
    16/04/2025, 23:55

General

  • Target

    niha-main/nerialtersr.exe

  • Size

    1.2MB

  • MD5

    3e53d26a3ed58bf81c813ac849722914

  • SHA1

    a37fb5115c5701c725ebfeb9d70aa35529cc52c8

  • SHA256

    f5a00c671dce68fd126316573a5483cd836abdb9d8816ce44bb6dc02fedb0b70

  • SHA512

    44a2e9dfed195042b0ff8a8e8255e8d09e8efa0e5a5187397d4f9aab9e2401eed48085d60ea79fdbb2c2540986676d7f589b7d5ab570f29ef6b64a2eb28ace48

  • SSDEEP

    24576:lASJ9kWYGPWlk/vy7CjGWXgtWnlg88tFaGFey34W7g0WzUVrokb:dWlkny7CjsWn6myV7SUVro

Malware Config

Extracted

Family

lumma

C2

https://blacksmithz.run/yhfh

https://ijawdedmirror.run/ewqd

https://changeaie.top/geps

https://lonfgshadow.live/xawi

https://liftally.top/xasj

https://nighetwhisper.top/lekd

https://usalaccgfa.top/gsooz

https://zestmodp.top/zeda

https://owlflright.digital/qopy

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\niha-main\nerialtersr.exe
    "C:\Users\Admin\AppData\Local\Temp\niha-main\nerialtersr.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1260

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1260-0-0x0000000000E80000-0x0000000001246000-memory.dmp

    Filesize

    3.8MB

  • memory/1260-1-0x0000000000E80000-0x0000000001246000-memory.dmp

    Filesize

    3.8MB