General
-
Target
a.zip
-
Size
5.3MB
-
Sample
241128-tqepgsspat
-
MD5
8daabb56eac9a50bc60c24d47cd4ca73
-
SHA1
c77921d8eb12edecc57846f66136ad23bccb0c60
-
SHA256
b854463784f0a37615c216a36382f052c34c1fd60f8cab7ea21b6e4b74632101
-
SHA512
f1eb0917c24e587b263523ddaec3b87235cb4de8907105d25f84cda29a042a35cc6a7f61c648a979f6e778698cb05ea3f9ec0e3b926a2b9af19ab2a229e374be
-
SSDEEP
98304:dDV3njSDe83r2FK+dgpl+0NLuRZsm4NLuRZ9nJRzfc7IBqq7GOxX/DcYJk1NWaL4:X3njSDePFYDNqRZslNqRZ9vUUt5Jw/N4
Behavioral task
behavioral1
Sample
Extreme Injector.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
Extreme Injector.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Setup.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Targets
-
-
Target
Extreme Injector.exe
-
Size
120.4MB
-
MD5
bb4a2e06a95bc52e52a7b73ac4dae017
-
SHA1
6782e78fad29d8bb36a499f849e5f3752d3fd9c1
-
SHA256
608008c03f7bc4f36570c0dd1c844dbd8cae45b290498fc696cf03be28c45065
-
SHA512
5bbf706aeff7c16e593995712b0bda9d3db08e60ad1555d60cc15563c052c83284cdb4429504096a3575b27dd108d986115d7b043f7cff61c97d15869d20ab99
-
SSDEEP
12288:LV4fznmsSlFU2yZEHL5gjC91pMb0xFhRTlr7v:LuyflFjyZEFQC912bmhRxr7v
-
Lumma family
-
Suspicious use of SetThreadContext
-
-
-
Target
Setup.exe
-
Size
455KB
-
MD5
9c36c6db9d21eb8e2e760dbcf3243c5f
-
SHA1
89fff51cad1a0a022f707a4aabacf17a5718d308
-
SHA256
505a6196ef55cdf6ea05981ff1a1e92de468e7dde04b38a4f6e1747cb84f3d89
-
SHA512
f09f18d9fd264e004a6132a200992f2b9dfa24a1d628dd983d7ecd1ee3f3ab987957ba202db7f7ac42a40053c41961810ad37255daa1e3b3ebcac0e3ce5aad44
-
SSDEEP
12288:LV4fznmsSlFU2yZEHL5gjC91pMb0xFhRTlr7v:LuyflFjyZEFQC912bmhRxr7v
-
Lumma family
-
Suspicious use of SetThreadContext
-