General
-
Target
scr1ipt.ps1
-
Size
7KB
-
Sample
240614-qwaqyasfqe
-
MD5
c44d7216c3cc62db69cbe60ac2e67a1c
-
SHA1
3a7aedb6c1f4d072c4656dbd49317fe5b38dcc12
-
SHA256
db1b59a6777f2d0e813317be50541ff20b72dd82711feb6f73c875e58a37343b
-
SHA512
892cc044bab84a48a953f8a46a55247c12bfb3b34774e106ae4632b3bc7e6f63ec88299c3a685d46c64f49c497a261057acc4184bf3a4d9487fd0e7d2817456d
-
SSDEEP
192:7qFeaF0diqqeaYzkIJm/5Z0dK7ZhWz7Xhbi9pdM3:79QV83YIcRZ3ZhSGQ
Static task
static1
Behavioral task
behavioral1
Sample
scr1ipt.ps1
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
scr1ipt.ps1
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
scr1ipt.ps1
Resource
win11-20240611-en
Malware Config
Extracted
https://bsc-dataseed1.binance.org/
Extracted
lumma
https://secretiveonnicuw.shop/api
https://liabiliytshareodlkv.shop/api
https://notoriousdcellkw.shop/api
https://conferencefreckewl.shop/api
https://flourhishdiscovrw.shop/api
https://landdumpycolorwskfw.shop/api
https://ohfantasyproclaiwlo.shop/api
https://parallelmercywksoffw.shop/api
https://barebrilliancedkoso.shop/api
Targets
-
-
Target
scr1ipt.ps1
-
Size
7KB
-
MD5
c44d7216c3cc62db69cbe60ac2e67a1c
-
SHA1
3a7aedb6c1f4d072c4656dbd49317fe5b38dcc12
-
SHA256
db1b59a6777f2d0e813317be50541ff20b72dd82711feb6f73c875e58a37343b
-
SHA512
892cc044bab84a48a953f8a46a55247c12bfb3b34774e106ae4632b3bc7e6f63ec88299c3a685d46c64f49c497a261057acc4184bf3a4d9487fd0e7d2817456d
-
SSDEEP
192:7qFeaF0diqqeaYzkIJm/5Z0dK7ZhWz7Xhbi9pdM3:79QV83YIcRZ3ZhSGQ
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-