General
-
Target
ae6fd6a90f575cba696d0c0b4e4bef797bcfe1f28325ae48a8b73780c543aa49.exe
-
Size
505KB
-
Sample
241126-yl2qnswrbt
-
MD5
6b7a9e12ceddadc722dd5f2632754bb9
-
SHA1
00991fe361d5d7247034f0fffdae9eaa212b25ad
-
SHA256
ae6fd6a90f575cba696d0c0b4e4bef797bcfe1f28325ae48a8b73780c543aa49
-
SHA512
315c6dd7c33878501e0b5df90d204ae134a900c8769e03bc0b0f20b112d51ce38ca17593f90407998481bd124397833982b8c0ccb06360c699c9f76de0f77205
-
SSDEEP
12288:8uYPABqG93bG2zYH13IYaMbY5PprGJmcUqBgwNhGiFv5Hr:NYPABNLGTV33aMbeLgg0Fxr
Static task
static1
Behavioral task
behavioral1
Sample
ae6fd6a90f575cba696d0c0b4e4bef797bcfe1f28325ae48a8b73780c543aa49.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Extracted
lumma
https://blade-govern.sbs/api
https://story-tense-faz.sbs/api
https://disobey-curly.sbs/api
https://motion-treesz.sbs/api
https://powerful-avoids.sbs/api
Targets
-
-
Target
ae6fd6a90f575cba696d0c0b4e4bef797bcfe1f28325ae48a8b73780c543aa49.exe
-
Size
505KB
-
MD5
6b7a9e12ceddadc722dd5f2632754bb9
-
SHA1
00991fe361d5d7247034f0fffdae9eaa212b25ad
-
SHA256
ae6fd6a90f575cba696d0c0b4e4bef797bcfe1f28325ae48a8b73780c543aa49
-
SHA512
315c6dd7c33878501e0b5df90d204ae134a900c8769e03bc0b0f20b112d51ce38ca17593f90407998481bd124397833982b8c0ccb06360c699c9f76de0f77205
-
SSDEEP
12288:8uYPABqG93bG2zYH13IYaMbY5PprGJmcUqBgwNhGiFv5Hr:NYPABNLGTV33aMbeLgg0Fxr
-
Lumma family
-
Suspicious use of SetThreadContext
-