Resubmissions

15-11-2024 20:30

241115-y946ps1gqa 7

15-11-2024 18:44

241115-xdv3gszdkn 7

General

  • Target

    LumiOS.v10.html

  • Size

    12.2MB

  • Sample

    241115-xdv3gszdkn

  • MD5

    8a3e362583a4e757a52f4f826cfe2d2e

  • SHA1

    24ca0c4367d8fdd6d4862e17d1c0c6b8312865ae

  • SHA256

    771130e7c313dc6e20cec19d1c77e01a1030149b3043462292f547357a67a4a0

  • SHA512

    d15fd696d0608f8e59197f6a849133313917ca7a8ea68cebb92b18bd246d3b4ec310888de30ddee0624a5491b361f809ba91a650ba0f40da63c21aefd7e0f945

  • SSDEEP

    49152:/UOPMARsK7Gqd7pkfnY3f2e6UQv2+lrywtaZOsuMzv6JFrPQ9Gc+qQNUmyvGqTuQ:rHgXJgX/t

Malware Config

Targets

    • Target

      LumiOS.v10.html

    • Size

      12.2MB

    • MD5

      8a3e362583a4e757a52f4f826cfe2d2e

    • SHA1

      24ca0c4367d8fdd6d4862e17d1c0c6b8312865ae

    • SHA256

      771130e7c313dc6e20cec19d1c77e01a1030149b3043462292f547357a67a4a0

    • SHA512

      d15fd696d0608f8e59197f6a849133313917ca7a8ea68cebb92b18bd246d3b4ec310888de30ddee0624a5491b361f809ba91a650ba0f40da63c21aefd7e0f945

    • SSDEEP

      49152:/UOPMARsK7Gqd7pkfnY3f2e6UQv2+lrywtaZOsuMzv6JFrPQ9Gc+qQNUmyvGqTuQ:rHgXJgX/t

    • A potential corporate email address has been identified in the URL: [email protected]

    • Legitimate hosting services abused for malware hosting/C2

    • Detected potential entity reuse from brand STEAM.

MITRE ATT&CK Enterprise v15

Tasks