General
-
Target
b260f38480746bb3769dbbc23802b3207b093e552d61b3e787386b94b081e31f
-
Size
80KB
-
Sample
250121-xb6ffawqet
-
MD5
07fd51e1e8368144ea403137a671b84c
-
SHA1
b41a78c43c5bf58f6664cb455130c9501c370f05
-
SHA256
b260f38480746bb3769dbbc23802b3207b093e552d61b3e787386b94b081e31f
-
SHA512
854a57be09cb09217d268f9e5c2d9ce5da8cbed1fa75c3ec38cc2f1b323377cdbd4db29687fa01e186a1cad6a2ee2e18f8645f98f551eeaa9805269a21354dd7
-
SSDEEP
1536:Y2ShYtT4To+GdOfoPXRr9tXLtAuQeSVdJssWdcd7IW3+ZR+ueK:Y2z0To+GdlhrbwJJ7IW3+n+ue
Static task
static1
Behavioral task
behavioral1
Sample
b260f38480746bb3769dbbc23802b3207b093e552d61b3e787386b94b081e31f.dll
Resource
win7-20240903-en
Malware Config
Extracted
http://147.45.44.131/infopage/ioubcs.exe
http://147.45.44.131/infopage/ioubcs.exe
Extracted
lumma
https://factlosserk.click/api
Targets
-
-
Target
b260f38480746bb3769dbbc23802b3207b093e552d61b3e787386b94b081e31f
-
Size
80KB
-
MD5
07fd51e1e8368144ea403137a671b84c
-
SHA1
b41a78c43c5bf58f6664cb455130c9501c370f05
-
SHA256
b260f38480746bb3769dbbc23802b3207b093e552d61b3e787386b94b081e31f
-
SHA512
854a57be09cb09217d268f9e5c2d9ce5da8cbed1fa75c3ec38cc2f1b323377cdbd4db29687fa01e186a1cad6a2ee2e18f8645f98f551eeaa9805269a21354dd7
-
SSDEEP
1536:Y2ShYtT4To+GdOfoPXRr9tXLtAuQeSVdJssWdcd7IW3+ZR+ueK:Y2z0To+GdlhrbwJJ7IW3+n+ue
-
Lumma family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Suspicious use of SetThreadContext
-