General
-
Target
procexp.exe
-
Size
5.2MB
-
Sample
241223-srh8matjay
-
MD5
4cd37c393016ec28159c17dc3997c0b3
-
SHA1
6ee17584fdd59ea2fc2c3edcac56f9945a4e5148
-
SHA256
a26dae1a0da4d8849489b49e037bfc66d1efe72182a35ecb99d5d8e41fbf4b17
-
SHA512
05658e37284bf3619a2aa407d54a1a9de65e498a4cd8f6c90b88eeab1130e119d8cba9e29206c4ad6ea340894db23c64d1cf88f9f9fb4668b17414635458f23b
-
SSDEEP
98304:5hH/750kD6/qbDSXUx/ZZdx3+kyR9xPhCtArzQQujtKKIdJdOBXai4MbU7KPv:51dTSqA+DjSfEtsGtKKIdr6qiBo7s
Static task
static1
Behavioral task
behavioral1
Sample
procexp.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
procexp.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
lumma
Targets
-
-
Target
procexp.exe
-
Size
5.2MB
-
MD5
4cd37c393016ec28159c17dc3997c0b3
-
SHA1
6ee17584fdd59ea2fc2c3edcac56f9945a4e5148
-
SHA256
a26dae1a0da4d8849489b49e037bfc66d1efe72182a35ecb99d5d8e41fbf4b17
-
SHA512
05658e37284bf3619a2aa407d54a1a9de65e498a4cd8f6c90b88eeab1130e119d8cba9e29206c4ad6ea340894db23c64d1cf88f9f9fb4668b17414635458f23b
-
SSDEEP
98304:5hH/750kD6/qbDSXUx/ZZdx3+kyR9xPhCtArzQQujtKKIdJdOBXai4MbU7KPv:51dTSqA+DjSfEtsGtKKIdr6qiBo7s
Score10/10-
Detect Vidar Stealer
-
Lumma family
-
Vidar family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Suspicious use of SetThreadContext
-