General
-
Target
file.exe
-
Size
206KB
-
Sample
230115-qwslrafd53
-
MD5
24f41ccbbb9934a5261c8e389b3f9270
-
SHA1
e01722da03588b0ade8c4092567213075822e2ed
-
SHA256
2a28b6bba07b7fb9cb5015b56ff34e29e81c2c8c7ac99a1273b7e53263641733
-
SHA512
f737a17c7cedbfa939f78523f103d53c79f2924ec81fa2eea162344c44fdf3b2d4a08e6519dbc76b7154ad94492b40a30a0ef1e6f746616b3d59c8f44532ecd0
-
SSDEEP
3072:UXGOpC634wAI5/Us06dvGhXFZ6Q+uXfVpdi:QKdwGs1+9yut
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Malware Config
Extracted
lumma
77.73.134.68
Targets
-
-
Target
file.exe
-
Size
206KB
-
MD5
24f41ccbbb9934a5261c8e389b3f9270
-
SHA1
e01722da03588b0ade8c4092567213075822e2ed
-
SHA256
2a28b6bba07b7fb9cb5015b56ff34e29e81c2c8c7ac99a1273b7e53263641733
-
SHA512
f737a17c7cedbfa939f78523f103d53c79f2924ec81fa2eea162344c44fdf3b2d4a08e6519dbc76b7154ad94492b40a30a0ef1e6f746616b3d59c8f44532ecd0
-
SSDEEP
3072:UXGOpC634wAI5/Us06dvGhXFZ6Q+uXfVpdi:QKdwGs1+9yut
-
Detects Smokeloader packer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-