General
-
Target
initial_d.bat
-
Size
838B
-
Sample
250109-a1s53ssram
-
MD5
b8c74b6c596351ca5bd46c0bb6e98dfd
-
SHA1
6cb4b41a78059c30be91f2464bf790244a1c99d7
-
SHA256
babe2715fa636ffaf699ed8176d8ca007b94defdc2ed41fb138803c8847094f4
-
SHA512
22b256cb20232d00c9e2085a6d54404f3a2a2167931a637e4880054ac75605d15c38f004a69038e70366bd145c755aafef2047b79c7ab72e61566364a1df9610
Static task
static1
Behavioral task
behavioral1
Sample
initial_d.bat
Resource
win7-20240903-en
Malware Config
Extracted
https://s7.klipdywoziy.shop/hukk7.jpeg
Extracted
lumma
https://hoppricerwir.cyou/api
Targets
-
-
Target
initial_d.bat
-
Size
838B
-
MD5
b8c74b6c596351ca5bd46c0bb6e98dfd
-
SHA1
6cb4b41a78059c30be91f2464bf790244a1c99d7
-
SHA256
babe2715fa636ffaf699ed8176d8ca007b94defdc2ed41fb138803c8847094f4
-
SHA512
22b256cb20232d00c9e2085a6d54404f3a2a2167931a637e4880054ac75605d15c38f004a69038e70366bd145c755aafef2047b79c7ab72e61566364a1df9610
-
Lumma family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Suspicious use of SetThreadContext
-