General
-
Target
NeoFix.zip
-
Size
791B
-
Sample
240224-qfg53sdc81
-
MD5
95616cf9d843df637bb546d1be77e4b4
-
SHA1
f0d209d00b9c429d40645c9fe1ad18e93a338904
-
SHA256
edf5b930e8c43d0e25af44cf6ff6c4d96b6d39893d870ed7deea3c545e844206
-
SHA512
e23b23a28d08970933bc226fae7620a84082659e6c0659d119df7da62cbd108db35a5ca02c4ee48c89ef24e4faea2feecb8412b0a77fb9e3bb40afc9745cf3eb
Static task
static1
Malware Config
Extracted
lumma
https://controlopposedcallyo.shop/api
https://technologyenterdo.shop/api
https://detectordiscusser.shop/api
https://turkeyunlikelyofw.shop/api
https://associationokeo.shop/api
Targets
-
-
Target
NeoFix.zip
-
Size
791B
-
MD5
95616cf9d843df637bb546d1be77e4b4
-
SHA1
f0d209d00b9c429d40645c9fe1ad18e93a338904
-
SHA256
edf5b930e8c43d0e25af44cf6ff6c4d96b6d39893d870ed7deea3c545e844206
-
SHA512
e23b23a28d08970933bc226fae7620a84082659e6c0659d119df7da62cbd108db35a5ca02c4ee48c89ef24e4faea2feecb8412b0a77fb9e3bb40afc9745cf3eb
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-