General
-
Target
tmp
-
Size
470KB
-
Sample
240315-hevqsaab7x
-
MD5
9e203e42aad4a23d95bddec9509f4d72
-
SHA1
14726a881fc956c8d3450c580da6c9b921c38bd6
-
SHA256
9dcd2325222229aee939e07986dfd5eac660a3ad129979597707569af979ffea
-
SHA512
a1add22c1fd88653a1ecfc78d708e425f9dd7e1be4b286c5d2a69994c6f46d45e16b4ceb95fd6524cfcf72742145b2588b0f90344339827d2e4e83135d7e700a
-
SSDEEP
6144:yuwf0+RecrdM5x4z+TLonB3MRQ0+sCOMysnHLs7kSRqebpXbq4Hy6m51py:nUyLCBckT8sHLsBqebpJH5mc
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
Malware Config
Extracted
lumma
https://scrapedirtyieoqk.shop/api
https://associationokeo.shop/api
Targets
-
-
Target
tmp
-
Size
470KB
-
MD5
9e203e42aad4a23d95bddec9509f4d72
-
SHA1
14726a881fc956c8d3450c580da6c9b921c38bd6
-
SHA256
9dcd2325222229aee939e07986dfd5eac660a3ad129979597707569af979ffea
-
SHA512
a1add22c1fd88653a1ecfc78d708e425f9dd7e1be4b286c5d2a69994c6f46d45e16b4ceb95fd6524cfcf72742145b2588b0f90344339827d2e4e83135d7e700a
-
SSDEEP
6144:yuwf0+RecrdM5x4z+TLonB3MRQ0+sCOMysnHLs7kSRqebpXbq4Hy6m51py:nUyLCBckT8sHLsBqebpJH5mc
-
Detect ZGRat V1
-
Suspicious use of SetThreadContext
-