General
-
Target
file.exe
-
Size
9.9MB
-
Sample
240709-dvrlvawcqc
-
MD5
1f1f4fe201d22d5a3780966ed7244fea
-
SHA1
176268a77d1496ae64d97467887c494e08dd57a8
-
SHA256
0914e92d15507742da4feef71b1b21230138b450e334855cd980f46b394c4f71
-
SHA512
eeec7d6faaad7be0d02e6a7068dd2e667790fa45c1aa80cb23ff497595010a8766601b93a2a93ac3b2943a098090a2515e9b729e1de94d9247b1b40f0d057317
-
SSDEEP
98304:DFyisqTCKL5RhT3cyQBpU6nEU8/m5xLg:kWjLpjcyQLU6EU
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240704-en
Malware Config
Extracted
lumma
https://radiationnopp.shop/api
Targets
-
-
Target
file.exe
-
Size
9.9MB
-
MD5
1f1f4fe201d22d5a3780966ed7244fea
-
SHA1
176268a77d1496ae64d97467887c494e08dd57a8
-
SHA256
0914e92d15507742da4feef71b1b21230138b450e334855cd980f46b394c4f71
-
SHA512
eeec7d6faaad7be0d02e6a7068dd2e667790fa45c1aa80cb23ff497595010a8766601b93a2a93ac3b2943a098090a2515e9b729e1de94d9247b1b40f0d057317
-
SSDEEP
98304:DFyisqTCKL5RhT3cyQBpU6nEU8/m5xLg:kWjLpjcyQLU6EU
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-