General
-
Target
π-β#βLa-te-st-β-Se-t-up-β-Pas$-γγ#β9192β#-π.zip
-
Size
7.9MB
-
Sample
240908-wch6vsyerj
-
MD5
8916f5503d3b2a59451151f6e1b3ff1d
-
SHA1
65e1aafdd69d9103d58f3a39c6f0bec4760fd566
-
SHA256
62c2985f053b9535aa1c8d97c9d034736f88b0f19d1b46331a4e644e4c47a576
-
SHA512
57c45c28ef7c5ed888b87d17b5103ecdd9c2cf52007a62a98f23cf2115002915a8fbc65f3ef8054409c8129b67c8c3a2247b59d88bc790550c2a55d0c9bd56e6
-
SSDEEP
196608:i/7ZhJHpmf1XD7WLX+IPUATyVIVINcM/o1U0FxF7NMlrsOB:i/1HHsf1nWLX3JTyi8oxFTs
Static task
static1
Behavioral task
behavioral1
Sample
Set-up.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Set-up.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Set-up.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Set-up.exe
Resource
win11-20240802-en
Malware Config
Extracted
lumma
https://tenntysjuxmz.shop/api
Targets
-
-
Target
Set-up.exe
-
Size
5.4MB
-
MD5
ad2735f096925010a53450cb4178c89e
-
SHA1
c6d65163c6315a642664f4eaec0fae9528549bfe
-
SHA256
4e775b5fafb4e6d89a4694f8694d2b8b540534bd4a52ff42f70095f1c929160e
-
SHA512
1868b22a7c5cba89545b06f010c09c5418b3d86039099d681eee9567c47208fdba3b89c6251cf03c964c58c805280d45ba9c3533125f6bd3e0bc067477e03ab9
-
SSDEEP
98304:o/zx+riUDpJowboU+XEsumY2XW6jBYeZ1ER:2x+riUDwUj12X1tY5
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-