General
-
Target
6d56dd46639fc11b9e6afc6bd9dfc8e4
-
Size
92KB
-
Sample
231226-pb49daadf2
-
MD5
6d56dd46639fc11b9e6afc6bd9dfc8e4
-
SHA1
4f3dd3cdddf24284cca094e387d63ff897fb54c5
-
SHA256
c26ac74b7b8058eae09d963b45194c1a18c6099959b603fbe4e88a7a15c6b653
-
SHA512
494b17dea9978439dc25bf4135fd5c881c8d9f81b50fd5ebcab52f6aecaed84ea6cc6e9935f2ff4dd8a99d906939f7f258d8651378c4acc691c1600680c18bad
-
SSDEEP
1536:xSquE20GQkV+o7Y5tvIJHz8qFTm5FzWbIa/jtvG+FEUU9lID1WMc7kWg7vrHu6Ot:+pKtvHzXartvG+gba+I7vjx8
Static task
static1
Behavioral task
behavioral1
Sample
6d56dd46639fc11b9e6afc6bd9dfc8e4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6d56dd46639fc11b9e6afc6bd9dfc8e4.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
6d56dd46639fc11b9e6afc6bd9dfc8e4
-
Size
92KB
-
MD5
6d56dd46639fc11b9e6afc6bd9dfc8e4
-
SHA1
4f3dd3cdddf24284cca094e387d63ff897fb54c5
-
SHA256
c26ac74b7b8058eae09d963b45194c1a18c6099959b603fbe4e88a7a15c6b653
-
SHA512
494b17dea9978439dc25bf4135fd5c881c8d9f81b50fd5ebcab52f6aecaed84ea6cc6e9935f2ff4dd8a99d906939f7f258d8651378c4acc691c1600680c18bad
-
SSDEEP
1536:xSquE20GQkV+o7Y5tvIJHz8qFTm5FzWbIa/jtvG+FEUU9lID1WMc7kWg7vrHu6Ot:+pKtvHzXartvG+gba+I7vjx8
-
Detect Lumma Stealer payload V4
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-