General
-
Target
47110ef49f5b24c718d63e79c4cbbb0121bdfc4889d42febe5a5409a2f2f3899.unknown
-
Size
459B
-
Sample
241123-ctv27s1qgk
-
MD5
a08cd6c1b50f050a764180741c3b32c4
-
SHA1
8e490919f1fa3ee1a75fd59fa3426d95cc455bd4
-
SHA256
47110ef49f5b24c718d63e79c4cbbb0121bdfc4889d42febe5a5409a2f2f3899
-
SHA512
e5a799d4c3c8572ea4a127ab9ee73d85b80c3339f4d0b73b44b6b183764732bac7e3a19aa9baa86ebb3c4cbf6b1a5c5f102075e3d8401473c657131a8172d77a
Static task
static1
Behavioral task
behavioral1
Sample
47110ef49f5b24c718d63e79c4cbbb0121bdfc4889d42febe5a5409a2f2f3899.ps1
Resource
win7-20240903-en
Malware Config
Extracted
https://pub-7a0525921ff54f1193db83d7303c6ee8.r2.dev/poltos.zip
Extracted
lumma
https://w0rdergen1.cyou/api
Targets
-
-
Target
47110ef49f5b24c718d63e79c4cbbb0121bdfc4889d42febe5a5409a2f2f3899.unknown
-
Size
459B
-
MD5
a08cd6c1b50f050a764180741c3b32c4
-
SHA1
8e490919f1fa3ee1a75fd59fa3426d95cc455bd4
-
SHA256
47110ef49f5b24c718d63e79c4cbbb0121bdfc4889d42febe5a5409a2f2f3899
-
SHA512
e5a799d4c3c8572ea4a127ab9ee73d85b80c3339f4d0b73b44b6b183764732bac7e3a19aa9baa86ebb3c4cbf6b1a5c5f102075e3d8401473c657131a8172d77a
-
Lumma family
-
Blocklisted process makes network request
-
Executes dropped EXE
-