General
-
Target
mal.ps1
-
Size
477B
-
Sample
250120-lrmsgstjdt
-
MD5
106e8b1d646ba58948fa57cd919784b5
-
SHA1
3c85495907a81aef34897e341703d2f7ad92a15b
-
SHA256
572175d8c355a0e9e993eb3855fbb8b8aaac38ebb57eb14eb4757d52ec4605a7
-
SHA512
a203b40d0b577f8e113c449520da60ad194e031be591132c6cbce38a7afa21fe4f6ea6cd88e27d4bdc42ec12acbb5861175be62a3b721968906f754a44d038ac
Static task
static1
Behavioral task
behavioral1
Sample
mal.ps1
Resource
win7-20240903-en
Malware Config
Extracted
https://n.kliphirofey.shop/43cee3481683f8897547367aa517dd31.png
Extracted
lumma
https://writeimgaiin.cyou/api
Targets
-
-
Target
mal.ps1
-
Size
477B
-
MD5
106e8b1d646ba58948fa57cd919784b5
-
SHA1
3c85495907a81aef34897e341703d2f7ad92a15b
-
SHA256
572175d8c355a0e9e993eb3855fbb8b8aaac38ebb57eb14eb4757d52ec4605a7
-
SHA512
a203b40d0b577f8e113c449520da60ad194e031be591132c6cbce38a7afa21fe4f6ea6cd88e27d4bdc42ec12acbb5861175be62a3b721968906f754a44d038ac
-
Lumma family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Suspicious use of SetThreadContext
-