Analysis

  • max time kernel
    104s
  • max time network
    108s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250410-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250410-enlocale:en-usos:windows10-ltsc_2021-x64system
  • submitted
    16/04/2025, 23:55

General

  • Target

    niha-main/derq.exe

  • Size

    1.2MB

  • MD5

    95066cf9828ee2bc75ca7c7034f8687e

  • SHA1

    09fec1af2c49aa8cdfb7325013cadaa4ec4a42e6

  • SHA256

    15a0adcdf8163396c81aa12b1505b0658c2f4880f6f08eab6624a692fdfbda7e

  • SHA512

    4007cf6064852492a9bc269c5c9d5a49a611521bcde8bdf92b4fe1a068d0c73c93ee478fb4341909f82c5b55f9d3c9bb52817421d63b2771d986edc07e2e686d

  • SSDEEP

    24576:bh7gE1dzQw3cYNYFcQrQyEovj6B/Kkxdu98DNFIoEYO8pRfEL/Ne6:bh11hH3duFxrQ1Zdu9SIoEYLTi1r

Malware Config

Extracted

Family

lumma

C2

https://aadvento.run/SAOznj

https://jawdedmirror.run/ewqd

https://changeaie.top/geps

https://lonfgshadow.live/xawi

https://liftally.top/xasj

https://tnighetwhisper.top/lekd

https://salaccgfa.top/gsooz

https://zestmodp.top/zeda

https://owlflright.digital/qopy

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\niha-main\derq.exe
    "C:\Users\Admin\AppData\Local\Temp\niha-main\derq.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:5768

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5768-0-0x0000000000710000-0x0000000000AD6000-memory.dmp

    Filesize

    3.8MB

  • memory/5768-1-0x0000000000710000-0x0000000000AD6000-memory.dmp

    Filesize

    3.8MB