General
-
Target
-
Size
761KB
-
Sample
241125-sl1kqaspfz
-
MD5
0171e5ac0ad0131d3232978521eb2f1e
-
SHA1
4a0d85deee727f468ccb831078b8a5b6b00d0cdb
-
SHA256
dd50c31d7a1bc0cede8ece67a18548f2351fb9c629cc5007172d32844fe72f26
-
SHA512
b7332dbe17f30493a01df9ee63c44c3e9be6e120d777bf59628e8d7d147bc0923bdbe53a150c661e273bd55018f9f499661c74be4a53c9b4be1866422e824fe2
-
SSDEEP
12288:3loqMjMj1gxdzWY3X9ecyeHwYo2FjUnEuAzFTJqLnScUUHV3rmdM+SsC8DtvhSHT:VoqhiiY3N0cweFjmEuwBoLSbKVwM+vCp
Static task
static1
Behavioral task
behavioral5
Sample
Filepass.txt
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Filepass.txt
Resource
win10v2004-20241007-en
Malware Config
Extracted
lumma
https://preachlock12.cyou/api
Targets
-
-
Target
-
Size
761KB
-
MD5
0171e5ac0ad0131d3232978521eb2f1e
-
SHA1
4a0d85deee727f468ccb831078b8a5b6b00d0cdb
-
SHA256
dd50c31d7a1bc0cede8ece67a18548f2351fb9c629cc5007172d32844fe72f26
-
SHA512
b7332dbe17f30493a01df9ee63c44c3e9be6e120d777bf59628e8d7d147bc0923bdbe53a150c661e273bd55018f9f499661c74be4a53c9b4be1866422e824fe2
-
SSDEEP
12288:3loqMjMj1gxdzWY3X9ecyeHwYo2FjUnEuAzFTJqLnScUUHV3rmdM+SsC8DtvhSHT:VoqhiiY3N0cweFjmEuwBoLSbKVwM+vCp
-
Lumma family
-
Executes dropped EXE
-
-
-
Target
File is here/@[email protected]
-
Size
761KB
-
MD5
cbd97bec8477de25e8c78d657f50196f
-
SHA1
2dd7500e88b6cc2f777de3cd5ac9c8c35c92ad4a
-
SHA256
0677918262e25e59c0404e9580dca35846238732d442b683f5c47ba8da5b8884
-
SHA512
a0ec9025a8751d250a67e1ebc60b0048c760d27b0e3f3008ed65cfa264f6da1a364dd05f99d883cbcd704178edab783d0bc648d9e41b49db2680aa7ae32531fc
-
SSDEEP
12288:eloqMjMj1gxdzWY3X9ecyeHwYo2FjUnEuAzFTJqLnScUUHV3rmdM+SsC8DtvhSHS:EoqhiiY3N0cweFjmEuwBoLSbKVwM+vCY
Score1/10 -
-
-
Target
Filepass.txt
-
Size
700B
-
MD5
d45b85357cd6835d9b911840a98d97d1
-
SHA1
d032330d98187d9882dd248cff52dc2b7bf36670
-
SHA256
987a15f98f2b8790a437398faf2332868a23e6856a65113ba8d8d36d8c529d36
-
SHA512
a46febbf8e0b0f8556e258529a4c4eeebf22fa649641ac3cdb556de96642e62d94254cda93c22e3a517a743e804e90b3026e066f7b4aa4e3232706abc33b516d
Score1/10 -