General
-
Target
file.exe
-
Size
2.4MB
-
Sample
230713-sbkrhsaa6s
-
MD5
2f1c7433a00d30601e7c917054410f18
-
SHA1
77b00246cb930221bed6240a8ee54108831b3817
-
SHA256
538c15e2ef697a6df0e325be5536e0e7c88f1faf9cbd583cd054f43282a1ba85
-
SHA512
ad0c508a0f858ff5c263bd1077bebaf1cb77b2e8edc89bed00e6c49ef0f8f08d7a37fdd05c16a7896270b00a298b2b75e5cedd533ecf42afe19ea86f73ac403a
-
SSDEEP
49152:GCWafkAugEDgzEApyWBO1qymUVUtPcmcwd:LV5EDK/kqyZVUtPcb4
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230712-en
Malware Config
Extracted
lumma
gstatic-node.io
Targets
-
-
Target
file.exe
-
Size
2.4MB
-
MD5
2f1c7433a00d30601e7c917054410f18
-
SHA1
77b00246cb930221bed6240a8ee54108831b3817
-
SHA256
538c15e2ef697a6df0e325be5536e0e7c88f1faf9cbd583cd054f43282a1ba85
-
SHA512
ad0c508a0f858ff5c263bd1077bebaf1cb77b2e8edc89bed00e6c49ef0f8f08d7a37fdd05c16a7896270b00a298b2b75e5cedd533ecf42afe19ea86f73ac403a
-
SSDEEP
49152:GCWafkAugEDgzEApyWBO1qymUVUtPcmcwd:LV5EDK/kqyZVUtPcb4
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-