General
-
Target
testtest.txt
-
Size
122B
-
Sample
241119-g624hasbqn
-
MD5
e3d8d364c2e11978a40a0876756f8f64
-
SHA1
00ea4c6338819e1ca4db49d60729e633353a2df8
-
SHA256
a177006460f7517a35bb7a971df24f09bde4204630e6c00c976cb57e3aa07c39
-
SHA512
5916e10d03091c2c9226c773f276245adb014e9ba0715948a05ed02e358ddef2dbd1dd1fb9db983faefb34c303425f2dcfe06ad4048b90c587863741ab2a5b0e
Static task
static1
Malware Config
Extracted
https://fixedzip.oss-ap-southeast-5.aliyuncs.com/replace.txt
https://fixedzip.oss-ap-southeast-5.aliyuncs.com/replace.txt
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Targets
-
-
Target
testtest.txt
-
Size
122B
-
MD5
e3d8d364c2e11978a40a0876756f8f64
-
SHA1
00ea4c6338819e1ca4db49d60729e633353a2df8
-
SHA256
a177006460f7517a35bb7a971df24f09bde4204630e6c00c976cb57e3aa07c39
-
SHA512
5916e10d03091c2c9226c773f276245adb014e9ba0715948a05ed02e358ddef2dbd1dd1fb9db983faefb34c303425f2dcfe06ad4048b90c587863741ab2a5b0e
-
Lumma family
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-