Resubmissions
21-11-2024 10:49
241121-mwpcjswkfp 10General
-
Target
ps.ps1
-
Size
472B
-
Sample
241121-mwpcjswkfp
-
MD5
ef0d9527ca42f62ee38b929d577435d1
-
SHA1
00f9fb6240e0bb430a793dee9275ff0454f7c8c9
-
SHA256
ed89e47950562f8720f044b3e92c359051d063681ecebf645e5c9ecc11517ac4
-
SHA512
731f2950c30498f1d51274977293e95f13229a647f7249cfc52dd9f6db97108b1056deba9e8a0ec5f4b19755567632e2c3ee9816a5b47f7880f940b951addb50
Static task
static1
Behavioral task
behavioral1
Sample
ps.ps1
Resource
win7-20241010-en
Malware Config
Extracted
https://pub-7a0525921ff54f1193db83d7303c6ee8.r2.dev/poltos.zip
Extracted
lumma
https://w0rdergen1.cyou/api
Targets
-
-
Target
ps.ps1
-
Size
472B
-
MD5
ef0d9527ca42f62ee38b929d577435d1
-
SHA1
00f9fb6240e0bb430a793dee9275ff0454f7c8c9
-
SHA256
ed89e47950562f8720f044b3e92c359051d063681ecebf645e5c9ecc11517ac4
-
SHA512
731f2950c30498f1d51274977293e95f13229a647f7249cfc52dd9f6db97108b1056deba9e8a0ec5f4b19755567632e2c3ee9816a5b47f7880f940b951addb50
-
Lumma family
-
Blocklisted process makes network request
-
Executes dropped EXE
-