General
-
Target
4004e71490385a537eec315b50a93dd52119098e73649d71f3d1398ea84f5af8.exe
-
Size
446KB
-
Sample
241127-e49z8axkfv
-
MD5
67021f186228bac715db0dff975142bd
-
SHA1
8b52fa5fc51c6e98b8407a91bd2c4103a7b058bd
-
SHA256
4004e71490385a537eec315b50a93dd52119098e73649d71f3d1398ea84f5af8
-
SHA512
05e2424c9b3f8c93fbce28faa3b1d70c6b6a5a3865485fec9fcc2bf59316756ca3fca79ed56839010c4b251e4433ce109af6a9bcaedc8fdf4a180af79ccf9eb7
-
SSDEEP
12288:1Xvc3IJ0OgEITM0AU037+UBiNJ9oKZEbrOM89BavY0LnlzvGjjGDwpEhk5uUjWR8:RvT0IITM0AU037+UBiNJ9oKZEbrOM89v
Static task
static1
Behavioral task
behavioral1
Sample
4004e71490385a537eec315b50a93dd52119098e73649d71f3d1398ea84f5af8.dll
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
Extracted
lumma
https://blade-govern.sbs/api
https://story-tense-faz.sbs/api
Targets
-
-
Target
4004e71490385a537eec315b50a93dd52119098e73649d71f3d1398ea84f5af8.exe
-
Size
446KB
-
MD5
67021f186228bac715db0dff975142bd
-
SHA1
8b52fa5fc51c6e98b8407a91bd2c4103a7b058bd
-
SHA256
4004e71490385a537eec315b50a93dd52119098e73649d71f3d1398ea84f5af8
-
SHA512
05e2424c9b3f8c93fbce28faa3b1d70c6b6a5a3865485fec9fcc2bf59316756ca3fca79ed56839010c4b251e4433ce109af6a9bcaedc8fdf4a180af79ccf9eb7
-
SSDEEP
12288:1Xvc3IJ0OgEITM0AU037+UBiNJ9oKZEbrOM89BavY0LnlzvGjjGDwpEhk5uUjWR8:RvT0IITM0AU037+UBiNJ9oKZEbrOM89v
-
Lumma family
-
Suspicious use of SetThreadContext
-