General
-
Target
redirect
-
Size
6KB
-
Sample
241230-cw6lqavmhr
-
MD5
c398de9d6322486130937b6ff56431af
-
SHA1
a92376812e7c6c5b7f41730c6c529e8d735ce185
-
SHA256
a23eb9fe20f786cca4328fd9395ce4e36c092fc982a47b2c1ba3d6d071b5b1af
-
SHA512
cebcd61854d0256b6fc757277b8fcf74a31effe386c10cbc8812351996839242e22096f111de2d0103c9c97f6c5ab28fe3aed0062f1b447c98367f4c2fb79fb8
-
SSDEEP
192:dWHLxX7777/77QF799yrQ0Lod4BYCIkg3OPwX+Cf+:dWr5HYh0+CIkaO4X/W
Static task
static1
Behavioral task
behavioral1
Sample
redirect.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
redirect.html
Resource
win10v2004-20241007-en
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://cloudewahsj.shop/api
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
Targets
-
-
Target
redirect
-
Size
6KB
-
MD5
c398de9d6322486130937b6ff56431af
-
SHA1
a92376812e7c6c5b7f41730c6c529e8d735ce185
-
SHA256
a23eb9fe20f786cca4328fd9395ce4e36c092fc982a47b2c1ba3d6d071b5b1af
-
SHA512
cebcd61854d0256b6fc757277b8fcf74a31effe386c10cbc8812351996839242e22096f111de2d0103c9c97f6c5ab28fe3aed0062f1b447c98367f4c2fb79fb8
-
SSDEEP
192:dWHLxX7777/77QF799yrQ0Lod4BYCIkg3OPwX+Cf+:dWr5HYh0+CIkaO4X/W
Score10/10-
Lumma family
-
A potential corporate email address has been identified in the URL: [email protected]
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-