General
-
Target
oLjfePjg.txt
-
Size
40.7MB
-
Sample
241127-rgs5eawphs
-
MD5
88a5f6c22e2fb3a57f186338c207fb13
-
SHA1
0e80bef96bc198797cf05521192e492fb068a3bc
-
SHA256
337878fbbbf37304642477ba26b75b1bfb6a39949463c2ba718f41430ac1b5ee
-
SHA512
c060b99e30a8cb2755471040e32a517f78f0369cb57d794010e2ca66064446800bb272f0db1fdd8af7ce0c7269d95dd4fdb4b27df2d1a179c0ffc199765a1147
-
SSDEEP
49152:rqQWkpJekS1LZHDWNsLBvvY5r6sosgmFoPdCNDSFHjYljUQoy/7VK7n09YTidHiO:P
Static task
static1
Behavioral task
behavioral1
Sample
oLjfePjg.txt
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
oLjfePjg.txt
Resource
win10v2004-20241007-en
Malware Config
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://motionless-temper.cyou
Extracted
lumma
https://motionless-temper.cyou/api
Targets
-
-
Target
oLjfePjg.txt
-
Size
40.7MB
-
MD5
88a5f6c22e2fb3a57f186338c207fb13
-
SHA1
0e80bef96bc198797cf05521192e492fb068a3bc
-
SHA256
337878fbbbf37304642477ba26b75b1bfb6a39949463c2ba718f41430ac1b5ee
-
SHA512
c060b99e30a8cb2755471040e32a517f78f0369cb57d794010e2ca66064446800bb272f0db1fdd8af7ce0c7269d95dd4fdb4b27df2d1a179c0ffc199765a1147
-
SSDEEP
49152:rqQWkpJekS1LZHDWNsLBvvY5r6sosgmFoPdCNDSFHjYljUQoy/7VK7n09YTidHiO:P
Score10/10-
Lumma family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-