General
-
Target
8ddb8e92032cbe0758431e0866b6bee6426e2f6422d3b00b26cb03c4f213785f
-
Size
6.4MB
-
Sample
240704-2l36aawapg
-
MD5
5050f9bc5d4a4cec3d2c08ed24480a10
-
SHA1
c3edc7c64810ece5a5fd4b9bc082b1f4dac7bf7f
-
SHA256
8ddb8e92032cbe0758431e0866b6bee6426e2f6422d3b00b26cb03c4f213785f
-
SHA512
2f62f4cba6a76681a0ecbb9977120978369ccd8bd2089227d1c581e30c190441f50f5561307eea737a28f625092287c6a6a0eaa924421d8789a72197d83062e6
-
SSDEEP
98304:6qwBqwWpcCHgb9m429vfTbDJgAWdWikDIyx2yR1OcS/7yMimxwnpyYOF8:6qwBqw16I9evL9Zik0k20wGnOa
Static task
static1
Behavioral task
behavioral1
Sample
8ddb8e92032cbe0758431e0866b6bee6426e2f6422d3b00b26cb03c4f213785f.exe
Resource
win7-20240220-en
Malware Config
Extracted
lumma
https://foodypannyjsud.shop/api
Targets
-
-
Target
8ddb8e92032cbe0758431e0866b6bee6426e2f6422d3b00b26cb03c4f213785f
-
Size
6.4MB
-
MD5
5050f9bc5d4a4cec3d2c08ed24480a10
-
SHA1
c3edc7c64810ece5a5fd4b9bc082b1f4dac7bf7f
-
SHA256
8ddb8e92032cbe0758431e0866b6bee6426e2f6422d3b00b26cb03c4f213785f
-
SHA512
2f62f4cba6a76681a0ecbb9977120978369ccd8bd2089227d1c581e30c190441f50f5561307eea737a28f625092287c6a6a0eaa924421d8789a72197d83062e6
-
SSDEEP
98304:6qwBqwWpcCHgb9m429vfTbDJgAWdWikDIyx2yR1OcS/7yMimxwnpyYOF8:6qwBqw16I9evL9Zik0k20wGnOa
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-