General
-
Target
N.zip
-
Size
322KB
-
Sample
250110-ardn2axqbm
-
MD5
26d36b363020e5a05f016239e56a8a71
-
SHA1
8a8b769c363bf9353ec6ec40dd4019760c0aa963
-
SHA256
a33e27dcad9a2dc5af96a85a97e9e78ca56ea50c5d2fe0d3faaaee61ea1f3890
-
SHA512
d84808ab1a81acaa81783211e7ef48a6431bd9d48f0d710d43e47e9cc6b75d8511eb9b040b26532809c2c41cecf871868e3beb2dacc7a245cd4cfd8ee6ecb7fd
-
SSDEEP
6144:edpGCW63cbQ6lKYoeV4DdtFKivaL/1/lGF0geR5aNjHn5cEqqb:eE363yQ6j4dDK8w9/EHbjHCAb
Static task
static1
Behavioral task
behavioral1
Sample
Nexol.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
Nexol.exe
Resource
win11-20241007-en
Malware Config
Extracted
lumma
https://fraggielek.biz/api
https://grandiouseziu.biz/api
https://littlenotii.biz/api
https://marketlumpe.biz/api
https://nuttyshopr.biz/api
https://punishzement.biz/api
https://spookycappy.biz/api
https://truculengisau.biz/api
Targets
-
-
Target
Nexol.exe
-
Size
336KB
-
MD5
df6e1225e3f7742dd9acbbbd14ce246a
-
SHA1
6390796d5b6e453bed100439be5d89ef9a9066e5
-
SHA256
33ae6c44a08efb52c0c69a8f8827f2afab230cce1cf9652fc63237d2e30622a4
-
SHA512
72b2b577b7b3a59401f455079cf79fa8e9c874c6c0293f984c5f726b9fa07ef59924790093709a86654db91a14d9565682c17093ee9cdb0df17ecff71ba1686c
-
SSDEEP
6144:cVQkSbQElKYoeV4bd1FKCvaL/1vlGF0UeR5aNj7nucEqq9:0QLQEjCdbKcw9vEdbj7hA9
-
Lumma family
-
Suspicious use of SetThreadContext
-