General
-
Target
WonderLoader_x64.exe
-
Size
386KB
-
Sample
250122-v9vqgsxmat
-
MD5
478f0df4019a27cc61a4e0fa8776fd28
-
SHA1
91826c97b096f95a82abd0beeb1f480d6cb0379b
-
SHA256
0f358d4351bb4ef7a67f2b6accfc65cecc8ebb767a7e29a66a43bf251af0026b
-
SHA512
f3e61f2f93cfdc5eb23b8725cd748f8225f1b8600aa3b7c851e42346a506578e0994f0ee2e9e8769a2ba0b26f033b6509a28622dea47fb7f33007f559cccae00
-
SSDEEP
6144:wrt64Ek3Eh0mgdtzCD9UBmOOMLQvdJGwlY0+HcPcG1zXwYaC9rQIlddLmfCHhwTJ:MR6CDnzCyB3ODJG/3cEG+CuIld+J
Static task
static1
Behavioral task
behavioral1
Sample
WonderLoader_x64.exe
Resource
win7-20241010-en
Malware Config
Extracted
lumma
https://supplyedtwoz.click/api
Targets
-
-
Target
WonderLoader_x64.exe
-
Size
386KB
-
MD5
478f0df4019a27cc61a4e0fa8776fd28
-
SHA1
91826c97b096f95a82abd0beeb1f480d6cb0379b
-
SHA256
0f358d4351bb4ef7a67f2b6accfc65cecc8ebb767a7e29a66a43bf251af0026b
-
SHA512
f3e61f2f93cfdc5eb23b8725cd748f8225f1b8600aa3b7c851e42346a506578e0994f0ee2e9e8769a2ba0b26f033b6509a28622dea47fb7f33007f559cccae00
-
SSDEEP
6144:wrt64Ek3Eh0mgdtzCD9UBmOOMLQvdJGwlY0+HcPcG1zXwYaC9rQIlddLmfCHhwTJ:MR6CDnzCyB3ODJG/3cEG+CuIld+J
-
Lumma family
-
Suspicious use of SetThreadContext
-