General
-
Target
ef4a502ddf1302d71b96fdd150613d35d2722868d669c4e8f33ff715d5456ad7
-
Size
730KB
-
Sample
241118-tnz8eazmcs
-
MD5
493ab5162b582687d104156ca1b10ba5
-
SHA1
ced8bc2467ec76184041447148e091f2752b0a54
-
SHA256
ef4a502ddf1302d71b96fdd150613d35d2722868d669c4e8f33ff715d5456ad7
-
SHA512
225a3e33d015aeb700ed13cb3b7f3c4f8485cac277cc3a2484c7dc4ce27733f0b17112d53e323cb4c96fecbfa2e98adf7f2e712d0dd9f482e7c985b62e464fb1
-
SSDEEP
12288:UpKGBVdHLhPvhQ9bF+q3olEqSAkMEb4Q6F4J+8d1hvxzTVoHQ2137/Qp9oI:RGB3JKFj3oPSAkjsF4s8RV2Hz7/Qp9oI
Static task
static1
Behavioral task
behavioral1
Sample
ef4a502ddf1302d71b96fdd150613d35d2722868d669c4e8f33ff715d5456ad7.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://c0al1t1onmatch.cyou/api
Targets
-
-
Target
ef4a502ddf1302d71b96fdd150613d35d2722868d669c4e8f33ff715d5456ad7
-
Size
730KB
-
MD5
493ab5162b582687d104156ca1b10ba5
-
SHA1
ced8bc2467ec76184041447148e091f2752b0a54
-
SHA256
ef4a502ddf1302d71b96fdd150613d35d2722868d669c4e8f33ff715d5456ad7
-
SHA512
225a3e33d015aeb700ed13cb3b7f3c4f8485cac277cc3a2484c7dc4ce27733f0b17112d53e323cb4c96fecbfa2e98adf7f2e712d0dd9f482e7c985b62e464fb1
-
SSDEEP
12288:UpKGBVdHLhPvhQ9bF+q3olEqSAkMEb4Q6F4J+8d1hvxzTVoHQ2137/Qp9oI:RGB3JKFj3oPSAkjsF4s8RV2Hz7/Qp9oI
-
Lumma family
-
Suspicious use of SetThreadContext
-