General
-
Target
Bootstrapper.exe
-
Size
760KB
-
Sample
240914-h5szwasbpn
-
MD5
59a858112ddd4ff9560abc44b560e1d4
-
SHA1
ccca63a6e8591f9aefa9e83ed94c9e40a6655135
-
SHA256
c0c87999c4766638051dcbece93da4562fc1b919483ccd5eea1cea77c9bb3601
-
SHA512
9d1033e2a9f4250d32ac86589c2c7830dedaf9afe49af30f4af750ca8eadcd11f4395c840a297e07ef8dbe2c9e1d27a5438efaf8d2e48335c6909412eb736587
-
SSDEEP
12288:OAcRtQSzS3X1BiagXPoHRqgjcHTRDOH5WJ/z7pA0ZnwGdAFSpIQUwGuR1Tgpd:GjwmoOv1z7QtFAIQUh2BWd
Static task
static1
Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Bootstrapper.exe
-
Size
760KB
-
MD5
59a858112ddd4ff9560abc44b560e1d4
-
SHA1
ccca63a6e8591f9aefa9e83ed94c9e40a6655135
-
SHA256
c0c87999c4766638051dcbece93da4562fc1b919483ccd5eea1cea77c9bb3601
-
SHA512
9d1033e2a9f4250d32ac86589c2c7830dedaf9afe49af30f4af750ca8eadcd11f4395c840a297e07ef8dbe2c9e1d27a5438efaf8d2e48335c6909412eb736587
-
SSDEEP
12288:OAcRtQSzS3X1BiagXPoHRqgjcHTRDOH5WJ/z7pA0ZnwGdAFSpIQUwGuR1Tgpd:GjwmoOv1z7QtFAIQUh2BWd
-
Detect Lumma Stealer payload V4
-
Suspicious use of SetThreadContext
-