General
-
Target
28d222fd592e63b9e73a63f8a2806532
-
Size
1.7MB
-
Sample
240914-skgq8azfkq
-
MD5
28d222fd592e63b9e73a63f8a2806532
-
SHA1
f579377b26b455fb1331623a2e7d0fedc71e255c
-
SHA256
ca21c5b129c001c2b51359d5f74c0a99667028810623b779190b13f0de86369e
-
SHA512
79d468087f729934de907e7c764610ee1a025ab020d6bcf2db9471b366e10c2ed503dddc72983db6f4be15ed44161a21f3ed9482aae02ed1687e5344250f4647
-
SSDEEP
24576:PCdbNNTSt/qWkAOh6wc0xqkTDxk43LfzAAdZeAr+Jor0I5ciRl8Jb73sIy:PwNUkAc6wLTjAkPrOq5c4a73sIy
Static task
static1
Behavioral task
behavioral1
Sample
28d222fd592e63b9e73a63f8a2806532.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
gstatic-node.io
blockigro.xyz
Targets
-
-
Target
28d222fd592e63b9e73a63f8a2806532
-
Size
1.7MB
-
MD5
28d222fd592e63b9e73a63f8a2806532
-
SHA1
f579377b26b455fb1331623a2e7d0fedc71e255c
-
SHA256
ca21c5b129c001c2b51359d5f74c0a99667028810623b779190b13f0de86369e
-
SHA512
79d468087f729934de907e7c764610ee1a025ab020d6bcf2db9471b366e10c2ed503dddc72983db6f4be15ed44161a21f3ed9482aae02ed1687e5344250f4647
-
SSDEEP
24576:PCdbNNTSt/qWkAOh6wc0xqkTDxk43LfzAAdZeAr+Jor0I5ciRl8Jb73sIy:PwNUkAc6wLTjAkPrOq5c4a73sIy
-
Detect Lumma Stealer payload V2
-
Detect Lumma Stealer payload V4
-
Suspicious use of SetThreadContext
-