General
-
Target
131415b711a7dbe49af20022577ad51c271d75175e32547a8107a56d7462f1d7
-
Size
495KB
-
Sample
241127-xy46wswnct
-
MD5
f6af7a6808f0e831fed6566c54b1e94e
-
SHA1
c892db08342003ea729c89e4b763448999eb4f5a
-
SHA256
131415b711a7dbe49af20022577ad51c271d75175e32547a8107a56d7462f1d7
-
SHA512
ab42cb1b69028a5a3788aa82c526a4fd7278dd0c1859bd968b4c0594a6a8c940a68299dfc375d4288def9e0e62c90a3939b70903057ebe1adda2d6d58db462a5
-
SSDEEP
6144:SJLDwnXc+nZ5tc5tpJgurXjjmNcEIwyg8XIcwgSzBC05fnP7UXnVgWXdqPmtLO4D:SJB+nneDgkXFEIJ0zzpfnQXlXlNeBsJ
Static task
static1
Behavioral task
behavioral1
Sample
131415b711a7dbe49af20022577ad51c271d75175e32547a8107a56d7462f1d7.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://fumblingactor.cyou
Targets
-
-
Target
131415b711a7dbe49af20022577ad51c271d75175e32547a8107a56d7462f1d7
-
Size
495KB
-
MD5
f6af7a6808f0e831fed6566c54b1e94e
-
SHA1
c892db08342003ea729c89e4b763448999eb4f5a
-
SHA256
131415b711a7dbe49af20022577ad51c271d75175e32547a8107a56d7462f1d7
-
SHA512
ab42cb1b69028a5a3788aa82c526a4fd7278dd0c1859bd968b4c0594a6a8c940a68299dfc375d4288def9e0e62c90a3939b70903057ebe1adda2d6d58db462a5
-
SSDEEP
6144:SJLDwnXc+nZ5tc5tpJgurXjjmNcEIwyg8XIcwgSzBC05fnP7UXnVgWXdqPmtLO4D:SJB+nneDgkXFEIJ0zzpfnQXlXlNeBsJ
-
Lumma family
-
Suspicious use of SetThreadContext
-