General
-
Target
CrosshairX.exe
-
Size
150.4MB
-
Sample
250105-wjqvaatlgm
-
MD5
c68c83300786177c8cdf38dc8b276937
-
SHA1
500d471de0d74c2317033f39866692649dff47fb
-
SHA256
e31ccd1df6c97cfce993def645f813d55405d3e5d858f0b2682a48ff2200888d
-
SHA512
45c94294198d9666addcfd532895db7db38f9a672ed4a1f7ea4cd6a0bd344e8df9b03e52eabd56572b217a064b695b314407dc136196eeef01172320f4220e27
-
SSDEEP
6144:pTPOsgo5qJgKjOfDDBrwHJAtlsGMpZh7exUG0Gv0JYlCaLkmJ3/n2b:pPOi8go6BrwSMpZg+GBv0JYlCahJ34
Static task
static1
Behavioral task
behavioral1
Sample
CrosshairX.exe
Resource
win7-20241010-en
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Targets
-
-
Target
CrosshairX.exe
-
Size
150.4MB
-
MD5
c68c83300786177c8cdf38dc8b276937
-
SHA1
500d471de0d74c2317033f39866692649dff47fb
-
SHA256
e31ccd1df6c97cfce993def645f813d55405d3e5d858f0b2682a48ff2200888d
-
SHA512
45c94294198d9666addcfd532895db7db38f9a672ed4a1f7ea4cd6a0bd344e8df9b03e52eabd56572b217a064b695b314407dc136196eeef01172320f4220e27
-
SSDEEP
6144:pTPOsgo5qJgKjOfDDBrwHJAtlsGMpZh7exUG0Gv0JYlCaLkmJ3/n2b:pPOi8go6BrwSMpZg+GBv0JYlCahJ34
-
Lumma family
-
Suspicious use of SetThreadContext
-