General
-
Target
Nexol.zip
-
Size
400KB
-
Sample
250103-ajqzds1nds
-
MD5
ab65c3addf18f5e4251d00996e1b4bb1
-
SHA1
1709401d64257d4fda48c7d5a58dcc312861bb23
-
SHA256
db65f22c79450d99a5684830ee4f549e691287e923f5119f58414be66b0c58ff
-
SHA512
9cf7649b6c479480e418c54dbd540b8812144b857f79729063edca2f235af3f2ab61a7677c9041b7129065e9c38be848081a0f843d0f70a926c9f30b62717650
-
SSDEEP
12288:fGYvMhzselWEA1NOuG4VhwDre9vzxfm9YbFE:fGZ1selM18qOml8Yy
Static task
static1
Behavioral task
behavioral1
Sample
Nexol.exe
Resource
win10ltsc2021-20241211-en
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Targets
-
-
Target
Nexol.exe
-
Size
493KB
-
MD5
6ad77591f0db42bbf78f936df0777fb4
-
SHA1
3089baca42421bbf11ebcb023bbb7835bc2994d0
-
SHA256
75ee1aa92a064ba1e77769843ece2ef6643db1e08da39b3a0b403b9899c2451d
-
SHA512
57cca32dbdbe2e4e870fa3195ea6b7c4c769c06a11eb5732aa9297d3b021ffaa6d1dd715f0dbd7a6535c8086c11c66161b8ca4a6ce9cb518363305fb0ba50f45
-
SSDEEP
12288:zztE0u86qlmk/I0VOug4Fhw7reLvZxf+9Yb4t:zO0uYlmsI00gcGTUYw
-
Lumma family
-
Suspicious use of SetThreadContext
-