General
-
Target
c10d8c90ddf07b2e6a1167ceb755559ff7a1305cdf0b0aca78771903504f10ee.zip
-
Size
2KB
-
Sample
250107-ac7nkawrar
-
MD5
65c8115dabcc202be32249a26321fcad
-
SHA1
8789f4cd12c7b07168e1411433f64ddc20214603
-
SHA256
c10d8c90ddf07b2e6a1167ceb755559ff7a1305cdf0b0aca78771903504f10ee
-
SHA512
5bf9d9b35f0ad81f1e9e91497008b50d038d894dd73a6a5dc166a108aa63847cd0026dc3539f65a64dae6634451635c939c3c8afee5801c714298e17f101fe58
Static task
static1
Behavioral task
behavioral1
Sample
c10d8c90ddf07b2e6a1167ceb755559ff7a1305cdf0b0aca78771903504f10ee.ps1
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
Targets
-
-
Target
c10d8c90ddf07b2e6a1167ceb755559ff7a1305cdf0b0aca78771903504f10ee.zip
-
Size
2KB
-
MD5
65c8115dabcc202be32249a26321fcad
-
SHA1
8789f4cd12c7b07168e1411433f64ddc20214603
-
SHA256
c10d8c90ddf07b2e6a1167ceb755559ff7a1305cdf0b0aca78771903504f10ee
-
SHA512
5bf9d9b35f0ad81f1e9e91497008b50d038d894dd73a6a5dc166a108aa63847cd0026dc3539f65a64dae6634451635c939c3c8afee5801c714298e17f101fe58
-
Asyncrat family
-
Lumma family
-
StormKitty payload
-
Stormkitty family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops startup file
-
Suspicious use of SetThreadContext
-