General
-
Target
4424-40-0x0000000000610000-0x0000000000AC0000-memory.dmp
-
Size
4.7MB
-
Sample
241127-ba1b5svngm
-
MD5
fdf79cd7189d1ecf1871d3960c3a19b9
-
SHA1
37c7b02d9810d6c80098ea528802cf7e5627522f
-
SHA256
d6371681bbb33d27dfa954cf6fee2b88ee9d7527e453dc26428ac954b5f651c3
-
SHA512
1bd5eb21c224fb287878d6fe20083a26985e0fbe6ce6563299031fb0c4919caea070ffe19198d36f327e6470bf7c216527b7b49d35c857c716272920be35f55c
-
SSDEEP
98304:OZINwVUkiFsQnYqGkPdGzCiNarigL4lYVvKGrQNWNvHbGXsZA0Dar:MIN9V2kPdGNNdGdKAJ70s20Da
Behavioral task
behavioral1
Sample
4424-40-0x0000000000610000-0x0000000000AC0000-memory.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4424-40-0x0000000000610000-0x0000000000AC0000-memory.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Targets
-
-
Target
4424-40-0x0000000000610000-0x0000000000AC0000-memory.dmp
-
Size
4.7MB
-
MD5
fdf79cd7189d1ecf1871d3960c3a19b9
-
SHA1
37c7b02d9810d6c80098ea528802cf7e5627522f
-
SHA256
d6371681bbb33d27dfa954cf6fee2b88ee9d7527e453dc26428ac954b5f651c3
-
SHA512
1bd5eb21c224fb287878d6fe20083a26985e0fbe6ce6563299031fb0c4919caea070ffe19198d36f327e6470bf7c216527b7b49d35c857c716272920be35f55c
-
SSDEEP
98304:OZINwVUkiFsQnYqGkPdGzCiNarigL4lYVvKGrQNWNvHbGXsZA0Dar:MIN9V2kPdGNNdGdKAJ70s20Da
Score3/10 -