General
-
Target
joas.txt
-
Size
563B
-
Sample
250120-j6swyaznfv
-
MD5
eec107adc7556820c3e5dd605ae5c0e2
-
SHA1
17678792ec06e9d8e46a2159661206ef4b353bdb
-
SHA256
ffc9ec8e21fc71ca14866897da1ad0402de51d94d17555274d486b79b3e1f8f1
-
SHA512
532e1a6e3226ecaad18e0cb498473f2f458e6fefc6362eaa12517bc00f970c05260ee4072b87eda01eab5fb9517d0a1759615262fc408d707d7d435b115f9be5
Static task
static1
Behavioral task
behavioral1
Sample
joas.ps1
Resource
win7-20240903-en
Malware Config
Extracted
https://fransize-veryf.com/gamdome.zip
Extracted
lumma
https://mushyomittel.cyou/api
Targets
-
-
Target
joas.txt
-
Size
563B
-
MD5
eec107adc7556820c3e5dd605ae5c0e2
-
SHA1
17678792ec06e9d8e46a2159661206ef4b353bdb
-
SHA256
ffc9ec8e21fc71ca14866897da1ad0402de51d94d17555274d486b79b3e1f8f1
-
SHA512
532e1a6e3226ecaad18e0cb498473f2f458e6fefc6362eaa12517bc00f970c05260ee4072b87eda01eab5fb9517d0a1759615262fc408d707d7d435b115f9be5
-
Lumma family
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-