General
-
Target
bffa45175f7093d5693eb363ef76e88afe0944a324a5fcedc6e746a2eab39b07
-
Size
7.2MB
-
Sample
240801-ee43nszhkk
-
MD5
9b16995cc10188cc620679e87dc37057
-
SHA1
5a4025686fd0b79b569e5bdcfc1f3476cfa37937
-
SHA256
bffa45175f7093d5693eb363ef76e88afe0944a324a5fcedc6e746a2eab39b07
-
SHA512
ae0756c3ad1798f456390b32d85d70bd2874ff6f4cf12be86d47b875e5713738e97d4ea113a7c40cca81796ec4f5244540792b9b6c87492fa42b5f47767c5670
-
SSDEEP
98304:DOzfSXDeDDtvFp7EwkWtA1bGdYNaYnqsO8u5yA09S:SSXDeVEwYqdYNaYnqsKm9S
Static task
static1
Behavioral task
behavioral1
Sample
bffa45175f7093d5693eb363ef76e88afe0944a324a5fcedc6e746a2eab39b07.exe
Resource
win7-20240708-en
Malware Config
Extracted
lumma
https://horizonvxjis.shop/api
https://effectivedoxzj.shop/api
https://parntorpkxzlp.shop/api
https://stimultaionsppzv.shop/api
https://grassytaisol.shop/api
https://broccoltisop.shop/api
https://shellfyyousdjz.shop/api
https://bravedreacisopm.shop/api
Extracted
lumma
https://horizonvxjis.shop/api
Targets
-
-
Target
bffa45175f7093d5693eb363ef76e88afe0944a324a5fcedc6e746a2eab39b07
-
Size
7.2MB
-
MD5
9b16995cc10188cc620679e87dc37057
-
SHA1
5a4025686fd0b79b569e5bdcfc1f3476cfa37937
-
SHA256
bffa45175f7093d5693eb363ef76e88afe0944a324a5fcedc6e746a2eab39b07
-
SHA512
ae0756c3ad1798f456390b32d85d70bd2874ff6f4cf12be86d47b875e5713738e97d4ea113a7c40cca81796ec4f5244540792b9b6c87492fa42b5f47767c5670
-
SSDEEP
98304:DOzfSXDeDDtvFp7EwkWtA1bGdYNaYnqsO8u5yA09S:SSXDeVEwYqdYNaYnqsKm9S
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-