General
-
Target
App_Sett-up.exe
-
Size
16.5MB
-
Sample
240822-wdhlqazckf
-
MD5
df2a64542dbdf26476b4ab9b54979ec9
-
SHA1
9e42e69eee14d66687e669c81f0e788de4712904
-
SHA256
19f4865d0221ac47c0a8ad5393c0a150fdcccb5ef72a63eba7daa42955f7c6e8
-
SHA512
0c5abadf8498ad6bcdd1a73e5117ea7ce4dfb88a4d51bb8031d20bfa5d5bb4c114f7117cfa0a2f6c50f70af16d16a9f36ef23fadcc480ba8fe5854301c8f5abd
-
SSDEEP
98304:mtNQAcLoqerVdHeUmyg9gGM1N5f7bNKBNo+gQXQi7kmeHh2yeH7rkfvVsg:QpO9zM1NJNKBLXQi7ZkfvVs
Static task
static1
Behavioral task
behavioral1
Sample
App_Sett-up.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
App_Sett-up.exe
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
App_Sett-up.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
App_Sett-up.exe
Resource
win11-20240802-en
Malware Config
Extracted
lumma
https://readdyloopyeow.shop/api
https://potentioallykeos.shop/api
Targets
-
-
Target
App_Sett-up.exe
-
Size
16.5MB
-
MD5
df2a64542dbdf26476b4ab9b54979ec9
-
SHA1
9e42e69eee14d66687e669c81f0e788de4712904
-
SHA256
19f4865d0221ac47c0a8ad5393c0a150fdcccb5ef72a63eba7daa42955f7c6e8
-
SHA512
0c5abadf8498ad6bcdd1a73e5117ea7ce4dfb88a4d51bb8031d20bfa5d5bb4c114f7117cfa0a2f6c50f70af16d16a9f36ef23fadcc480ba8fe5854301c8f5abd
-
SSDEEP
98304:mtNQAcLoqerVdHeUmyg9gGM1N5f7bNKBNo+gQXQi7kmeHh2yeH7rkfvVsg:QpO9zM1NJNKBLXQi7ZkfvVs
-
Suspicious use of SetThreadContext
-