General
-
Target
14f9e3ea623dccde8cc077de47dc6c1b
-
Size
216KB
-
Sample
231230-lvsg5sbhhr
-
MD5
14f9e3ea623dccde8cc077de47dc6c1b
-
SHA1
e55644d8a8b366d94f6e05be56daed1ff7ca4241
-
SHA256
3621cbb7c16bb07b3636356e9f73788c95057b3fe7cba6850e8f3b2d0fda6dc5
-
SHA512
e35bae057c97a7fe2567ca1562a1c7418f66cd07d92f52cf364133b679677aadece02e28375e44c47d2ed81e458742b2911a0ec2d5c624749cea694edfbd46b4
-
SSDEEP
6144:6b3UYmL5+wp7XH51MnD9fpoh+WclrLqE:6beLpJXZ1b+WSyE
Behavioral task
behavioral1
Sample
14f9e3ea623dccde8cc077de47dc6c1b.exe
Resource
win7-20231129-en
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Targets
-
-
Target
14f9e3ea623dccde8cc077de47dc6c1b
-
Size
216KB
-
MD5
14f9e3ea623dccde8cc077de47dc6c1b
-
SHA1
e55644d8a8b366d94f6e05be56daed1ff7ca4241
-
SHA256
3621cbb7c16bb07b3636356e9f73788c95057b3fe7cba6850e8f3b2d0fda6dc5
-
SHA512
e35bae057c97a7fe2567ca1562a1c7418f66cd07d92f52cf364133b679677aadece02e28375e44c47d2ed81e458742b2911a0ec2d5c624749cea694edfbd46b4
-
SSDEEP
6144:6b3UYmL5+wp7XH51MnD9fpoh+WclrLqE:6beLpJXZ1b+WSyE
-
Detect Lumma Stealer payload V4
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-