General
-
Target
534c66c9756cc17d47fbfa9a7e3fd6adc63a79e5391e07a93ce3ceb947ef7003.zip
-
Size
1.1MB
-
Sample
250117-fgm3lstlcr
-
MD5
6f1995600ae5d7b05e172ab31e98912c
-
SHA1
027c0e05826ebd03e06cdcacb65cd933b4e4b72d
-
SHA256
534c66c9756cc17d47fbfa9a7e3fd6adc63a79e5391e07a93ce3ceb947ef7003
-
SHA512
1bb78ef331e0830c3019604ef163c5aa552c40fb4af8189103262371ba83de651f58dcc1ecf4e4a5dc356a3757653f839201f38a0dabc3682bd8c55b6ca6c74e
-
SSDEEP
24576:8DYfcwdT6Kis4bpEq3gKZKS4SZdwhPCCP7QyF07yeVfEALU:ONwduvs4lE4VZKS/wBCCTQyFgGv
Static task
static1
Behavioral task
behavioral1
Sample
PsfLauncher32.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PsfLauncher32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
PsfRuntime32.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
PsfRuntime32.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
lumma
https://latyoutw.cyou/api
Targets
-
-
Target
PsfLauncher32.exe
-
Size
409KB
-
MD5
bbfa1775487c17383c10899ab8f9de7b
-
SHA1
004724f3dde5ca8b5b51d2436b04898567d5dbcf
-
SHA256
49e941b4c194bb97db10466d29c7dfc4b557b70913b43acc21d2572a936970f4
-
SHA512
ab774c1c341350b54d3aefe9f0e2ed7048d714409c4e148eb26738a255fdaf0c402e07b17086b73bba724bd3916722cd93e730a0c878d511533289d78632200e
-
SSDEEP
12288:lFcYBTSR7FqCiiD/UIC7R8muz6gKSCxX4/m03PcdHSg:lK3dDMIW8CSCxIzPctSg
-
Lumma family
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
-
-
Target
PsfRuntime32.dll
-
Size
348KB
-
MD5
2f930c4a4290be73802a5d650d613203
-
SHA1
fd98498a18edba028b4f590e7bd618ab7790391d
-
SHA256
e4ed1603a409bbfe6b6cb2aed7bac31b4c2812011aed11622fe6a00128f8a3e7
-
SHA512
5369b746856059da218e757bee86436c7c53828cccb7931245e8a96a6429eee6cc884103ee4b1ef678a595ff889933b22e938154b5a31e425340c7845a57b247
-
SSDEEP
6144:LHbZrDKWIDz5zfPz418t1Ee6rTnlsykEV+UlIetAO97YH4bgH1QWlK:zlSWIDz5Dz4G6rTnlsI+UHb7Y71QSK
Score3/10 -