General
-
Target
7f4bb44f712ac04f652b332ea1435e6f8eaa6053fd61e96f2ba6cfd0d11fd1b8
-
Size
13.4MB
-
Sample
241126-ypfbvaxjdy
-
MD5
29389bd6bd907ba09de3c13227bf2d69
-
SHA1
1b93a15d8f48774bd7fdd01f627cfddc087a8716
-
SHA256
7f4bb44f712ac04f652b332ea1435e6f8eaa6053fd61e96f2ba6cfd0d11fd1b8
-
SHA512
07eed5fef133328029894d2cc174a788566ab154648414fa2e86026ca3d885607d112dbd3916f683db99b3893e2f45390d666beaa7c297bfc5be32846592554a
-
SSDEEP
196608:yj+Vl1m/bFivLBTe5xKqn8elgXHa9S08b8gWvTKlKGSPOli/+eqC+wYA:yj+E/0vL7W+HaY08AgWvMKGlLw+wYA
Static task
static1
Behavioral task
behavioral1
Sample
7f4bb44f712ac04f652b332ea1435e6f8eaa6053fd61e96f2ba6cfd0d11fd1b8.exe
Resource
win7-20241010-en
Malware Config
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Extracted
lumma
https://blade-govern.sbs/api
https://story-tense-faz.sbs/api
https://disobey-curly.sbs/api
https://motion-treesz.sbs/api
https://powerful-avoids.sbs/api
Targets
-
-
Target
7f4bb44f712ac04f652b332ea1435e6f8eaa6053fd61e96f2ba6cfd0d11fd1b8
-
Size
13.4MB
-
MD5
29389bd6bd907ba09de3c13227bf2d69
-
SHA1
1b93a15d8f48774bd7fdd01f627cfddc087a8716
-
SHA256
7f4bb44f712ac04f652b332ea1435e6f8eaa6053fd61e96f2ba6cfd0d11fd1b8
-
SHA512
07eed5fef133328029894d2cc174a788566ab154648414fa2e86026ca3d885607d112dbd3916f683db99b3893e2f45390d666beaa7c297bfc5be32846592554a
-
SSDEEP
196608:yj+Vl1m/bFivLBTe5xKqn8elgXHa9S08b8gWvTKlKGSPOli/+eqC+wYA:yj+E/0vL7W+HaY08AgWvMKGlLw+wYA
-
Lumma family
-
Suspicious use of SetThreadContext
-