General
-
Target
index (9).html
-
Size
13KB
-
Sample
241121-t4elmsxrgp
-
MD5
12e5536bcda00a8c1e9bce21c4ec64ae
-
SHA1
ba047a81e59f3c518d4ef8d0e7b296b8a44be785
-
SHA256
05d7d827fbcd8c1a234325f3a43a0d920db5c4832fc227ee3bd1fbda3e8b7857
-
SHA512
1d5be1909a660323f281eea6bf83eee438b6f3892acc06c71ccd3fd559cc8f35bd286413dd7dab23f572f46b78e4b552c9a85177fef58a52ba93e7f199d51b01
-
SSDEEP
192:tDhfl4Owlroa7KBmydy5RG+NJjl51AT5EyqQiB4zo+YplmwIR42PN7y6yUHgL:VFKFG5E/QI4mmwz217jiL
Static task
static1
Malware Config
Extracted
lumma
https://dangerou5533.cyou/api
Targets
-
-
Target
index (9).html
-
Size
13KB
-
MD5
12e5536bcda00a8c1e9bce21c4ec64ae
-
SHA1
ba047a81e59f3c518d4ef8d0e7b296b8a44be785
-
SHA256
05d7d827fbcd8c1a234325f3a43a0d920db5c4832fc227ee3bd1fbda3e8b7857
-
SHA512
1d5be1909a660323f281eea6bf83eee438b6f3892acc06c71ccd3fd559cc8f35bd286413dd7dab23f572f46b78e4b552c9a85177fef58a52ba93e7f199d51b01
-
SSDEEP
192:tDhfl4Owlroa7KBmydy5RG+NJjl51AT5EyqQiB4zo+YplmwIR42PN7y6yUHgL:VFKFG5E/QI4mmwz217jiL
-
Lumma family
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-