General
-
Target
964-40-0x0000000000A30000-0x0000000000EF1000-memory.dmp
-
Size
4.8MB
-
Sample
241127-cdeqaa1kbs
-
MD5
3afedc06d25af8cb58a14c9e005d9f19
-
SHA1
407b2e1412570b4b959d8053cea84567709ad486
-
SHA256
4a232a296edf3c8e005d37fc522bd74387e41def759154335686724eb910113d
-
SHA512
5654ddfa68cba6011766bf57cf5ed17e00604afc6d98a308324f246501e2e3f3bc6521241b356a647c069734db907bb3c266f5d42be58d3d92cac2dc42ff7534
-
SSDEEP
98304:/xgftRglXtoQ5sKfCtCdjrBaZctpvVwTFnzDCBbC0KH2Bx7VIH:JgftQoCdwZctpvCTFyBbsy4
Behavioral task
behavioral1
Sample
964-40-0x0000000000A30000-0x0000000000EF1000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
964-40-0x0000000000A30000-0x0000000000EF1000-memory.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Targets
-
-
Target
964-40-0x0000000000A30000-0x0000000000EF1000-memory.dmp
-
Size
4.8MB
-
MD5
3afedc06d25af8cb58a14c9e005d9f19
-
SHA1
407b2e1412570b4b959d8053cea84567709ad486
-
SHA256
4a232a296edf3c8e005d37fc522bd74387e41def759154335686724eb910113d
-
SHA512
5654ddfa68cba6011766bf57cf5ed17e00604afc6d98a308324f246501e2e3f3bc6521241b356a647c069734db907bb3c266f5d42be58d3d92cac2dc42ff7534
-
SSDEEP
98304:/xgftRglXtoQ5sKfCtCdjrBaZctpvVwTFnzDCBbC0KH2Bx7VIH:JgftQoCdwZctpvCTFyBbsy4
Score3/10 -