General
-
Target
file.exe
-
Size
2.0MB
-
Sample
230702-vwz32sdd51
-
MD5
51a84a10ff8470817143bf75b437cf40
-
SHA1
81e295b0c89ce4c638343042dce4827449973d64
-
SHA256
df0de6f581fff0ddc9972190887715c30433bc08f4fdd3fbbe7cbfc0a0f9af9a
-
SHA512
9fe0c2599805cd1b315b104315a874685b63fad030186e10a03feb3fffe054bc59ea6335db84875a54d7031afd8619e85b7dd9b2be02d58179f3d7c7456fd8aa
-
SSDEEP
24576:k+GdzBbnH2+MqwZ7ZWDTnEvYDB020/JDD6h0Hf5OO0ii0XPtUTIk9qQHk:kbd9LWtqwZFO4mBwVDtfBHG/E
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230621-en
Malware Config
Extracted
lumma
gservice-node.io
Targets
-
-
Target
file.exe
-
Size
2.0MB
-
MD5
51a84a10ff8470817143bf75b437cf40
-
SHA1
81e295b0c89ce4c638343042dce4827449973d64
-
SHA256
df0de6f581fff0ddc9972190887715c30433bc08f4fdd3fbbe7cbfc0a0f9af9a
-
SHA512
9fe0c2599805cd1b315b104315a874685b63fad030186e10a03feb3fffe054bc59ea6335db84875a54d7031afd8619e85b7dd9b2be02d58179f3d7c7456fd8aa
-
SSDEEP
24576:k+GdzBbnH2+MqwZ7ZWDTnEvYDB020/JDD6h0Hf5OO0ii0XPtUTIk9qQHk:kbd9LWtqwZFO4mBwVDtfBHG/E
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-