General
-
Target
1737154984__«FîleReady▬PassWord▬Is☼◄172303►».zip
-
Size
407KB
-
Sample
250416-yjxzpsvtdw
-
MD5
ced26414ca3f2e9d6e330d76f9183f62
-
SHA1
f640e5339538a581d87c70b5046f109130c107d9
-
SHA256
75026653cd9be402306f50674ed7f8abead6d29517b76cda4a30ff1328798f3b
-
SHA512
be7e1e3f3ce3a1b8316fcafd1afb02155df31a7e38fd439d3c9c2c79b20f07ae94c7953ba363e94eef1c39bd46198c0d826f9632f4e5bae962450a5a052ec0a8
-
SSDEEP
6144:FW1lD8lJNW/1ny1qK2DpyKs2MVUGE1tg+El92nLKq4BDr6iJW/GsF02gjOtW5Ap1:krCoNhgKs2MWgJl9xKiJW+A02yV6a+
Static task
static1
Behavioral task
behavioral1
Sample
1737154984__«FîleReady▬PassWord▬Is☼◄172303►».zip
Resource
win11-20250410-en
Behavioral task
behavioral2
Sample
«FîleReady▬PassWord▬Is☼◄172303►».7z
Resource
win11-20250410-en
Malware Config
Extracted
lumma
https://futfilcreat.cyou/api
Targets
-
-
Target
1737154984__«FîleReady▬PassWord▬Is☼◄172303►».zip
-
Size
407KB
-
MD5
ced26414ca3f2e9d6e330d76f9183f62
-
SHA1
f640e5339538a581d87c70b5046f109130c107d9
-
SHA256
75026653cd9be402306f50674ed7f8abead6d29517b76cda4a30ff1328798f3b
-
SHA512
be7e1e3f3ce3a1b8316fcafd1afb02155df31a7e38fd439d3c9c2c79b20f07ae94c7953ba363e94eef1c39bd46198c0d826f9632f4e5bae962450a5a052ec0a8
-
SSDEEP
6144:FW1lD8lJNW/1ny1qK2DpyKs2MVUGE1tg+El92nLKq4BDr6iJW/GsF02gjOtW5Ap1:krCoNhgKs2MWgJl9xKiJW+A02yV6a+
Score1/10 -
-
-
Target
«FîleReady▬PassWord▬Is☼◄172303►».7z
-
Size
407KB
-
MD5
8f546fd8bc2b52410b1664cc4353f96e
-
SHA1
074a7013eb459c4a60f079ccb53dc0a6fd3da916
-
SHA256
70242bb3e670a4ead187ffe778b034eb96dc862188157715247a213ed3e73aa5
-
SHA512
f937ce99517d6acb08f4605d761adf3d5b18196d8f87423bcd879df5d3b67d04758ca1a63fbfb3e1963732de1f0a76648e497f6d9d846fd896aadc2ceb8e8d2a
-
SSDEEP
6144:qW1lD8lJNW/1ny1qK2DpyKs2MVUGE1tg+El92nLKq4BDr6iJW/GsF02gjOtW5ApN:VrCoNhgKs2MWgJl9xKiJW+A02yV6au
Score1/10 -
-
-
Target
Set-up.exe
-
Size
1.6MB
-
MD5
ff33d1aafaa5e7500d300224ee43283c
-
SHA1
e2cd7ecdb1365ef11324e34398e0d1e301622e77
-
SHA256
5c5d7028d222396fb174c5140a303a0f84e157b9dcf7b8a36078bb354cd2694f
-
SHA512
f12624c225598b443e07157e166ca4ee8fbc4cb1748f4d077305b7c5c9cc5e9c3545c05ebefcc1cffafad4fed32393af10fa19dce45d360c556f3ea95a54366f
-
SSDEEP
12288:qaoZa6HOfmrc414HSQgT/J0Hu+5pIvrjpk0xf3Frb+nKuhCFDmBcos+:bgB4HPgTB035pIvrjbxf3Fv6hkDBos+
-
Lumma family
-
Zloader family
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v16
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1