General
-
Target
HydraCheats.exe
-
Size
21.2MB
-
Sample
240901-wrszlsxgjq
-
MD5
6f9168a86fc6adf535de75e12a514a6f
-
SHA1
7ddbd2397653910de353a22ee23bc49426501309
-
SHA256
3037988aa68ca3431c78c5484b08c9d51f3ee619282ca2a1b9fc306e6a07eae1
-
SHA512
ee8ab2622e9b8e8f6bcf37dbd6a1b7a113d2bfe6067e656575681aec6ce16b6514bc1844c45f75dc2c46d847fb6fecf7819bc923fd612d44f099a5af205d89a9
-
SSDEEP
196608:pizpf8ui/wjumYnw+vj8x/CTwFE5uUEXbo:pgcwj0nNvj+l1j
Static task
static1
Behavioral task
behavioral1
Sample
HydraCheats.exe
Resource
win7-20240704-en
Malware Config
Extracted
lumma
https://wrappyprotesp.shop/api
https://locatedblsoqp.shop/api
Targets
-
-
Target
HydraCheats.exe
-
Size
21.2MB
-
MD5
6f9168a86fc6adf535de75e12a514a6f
-
SHA1
7ddbd2397653910de353a22ee23bc49426501309
-
SHA256
3037988aa68ca3431c78c5484b08c9d51f3ee619282ca2a1b9fc306e6a07eae1
-
SHA512
ee8ab2622e9b8e8f6bcf37dbd6a1b7a113d2bfe6067e656575681aec6ce16b6514bc1844c45f75dc2c46d847fb6fecf7819bc923fd612d44f099a5af205d89a9
-
SSDEEP
196608:pizpf8ui/wjumYnw+vj8x/CTwFE5uUEXbo:pgcwj0nNvj+l1j
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-