General
-
Target
script.py
-
Size
1KB
-
Sample
250106-y4ct9swqdt
-
MD5
447d04e6fcbef9b66eafa28b3a928a60
-
SHA1
4d716e1dd2520f1c9ab5d1a79f75c87a63101fa7
-
SHA256
6ec6c001e46e69a80acd54e349d6475a8198fc7178947c8cda9b56a244d6d6a3
-
SHA512
2c85aa2234e17bce10e51340fc99214e39fffe56b8c035aacd9be8f4a2c0806dcd8ce3f3762035904e43d4006e54f493fbccf32d7acdf9cfaec487453c5ece50
Static task
static1
Behavioral task
behavioral1
Sample
script.py
Resource
win7-20241010-en
Malware Config
Extracted
https://kliphylj.shop/sercd.json
Extracted
lumma
https://wholersorie.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
Targets
-
-
Target
script.py
-
Size
1KB
-
MD5
447d04e6fcbef9b66eafa28b3a928a60
-
SHA1
4d716e1dd2520f1c9ab5d1a79f75c87a63101fa7
-
SHA256
6ec6c001e46e69a80acd54e349d6475a8198fc7178947c8cda9b56a244d6d6a3
-
SHA512
2c85aa2234e17bce10e51340fc99214e39fffe56b8c035aacd9be8f4a2c0806dcd8ce3f3762035904e43d4006e54f493fbccf32d7acdf9cfaec487453c5ece50
-
Lumma family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Suspicious use of SetThreadContext
-