General
-
Target
4384-41-0x00000000008D0000-0x0000000000D7E000-memory.dmp
-
Size
4.7MB
-
Sample
241127-p4lmqs1jcq
-
MD5
27909b6282efbeb6334e51b997902b79
-
SHA1
0a870dda790a334815a3fb09a087f90048e7b3fb
-
SHA256
c36e4d70dd05a93a2b49e5db0dccf7edf6f8cfc4dfe3240d913da4d4361b6d13
-
SHA512
86e68bd7a549af17fa4ed375e85aa335b69f4e74a4b22b2362a59a38b97be4998b70415bab00a6eaf245772423da74caba7a51fcce5c2926dd0abdae75422c80
-
SSDEEP
98304:UM4pBiDiPCH5C9JInwhXmz+31xozvgKznvD8YN4wKLYKl:r4pMOO4ozvgKzn4YN4ZLll
Behavioral task
behavioral1
Sample
4384-41-0x00000000008D0000-0x0000000000D7E000-memory.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4384-41-0x00000000008D0000-0x0000000000D7E000-memory.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Targets
-
-
Target
4384-41-0x00000000008D0000-0x0000000000D7E000-memory.dmp
-
Size
4.7MB
-
MD5
27909b6282efbeb6334e51b997902b79
-
SHA1
0a870dda790a334815a3fb09a087f90048e7b3fb
-
SHA256
c36e4d70dd05a93a2b49e5db0dccf7edf6f8cfc4dfe3240d913da4d4361b6d13
-
SHA512
86e68bd7a549af17fa4ed375e85aa335b69f4e74a4b22b2362a59a38b97be4998b70415bab00a6eaf245772423da74caba7a51fcce5c2926dd0abdae75422c80
-
SSDEEP
98304:UM4pBiDiPCH5C9JInwhXmz+31xozvgKznvD8YN4wKLYKl:r4pMOO4ozvgKzn4YN4ZLll
Score3/10 -