General
-
Target
34.ps1
-
Size
1KB
-
Sample
250122-vrv9aswpdw
-
MD5
68bddac7ac658f9f72b58f984399756f
-
SHA1
f424b6c82945ddb068f8f7bc2f6ff2a72f5bf2d9
-
SHA256
cec8edd890e127b429f7801501f8637036048ca6f2d3c64b2c4d64f2168b07fd
-
SHA512
cb56d4642ec4cf77a96c059094cc9261a7136bdce4c313dcacae6e94db6e320dafb9be5498e33524315a21fc0d10a4c7d663b3bd096957c773df7de9c34d8d98
Static task
static1
Behavioral task
behavioral1
Sample
34.ps1
Resource
win7-20240903-en
Malware Config
Extracted
Protocol: ftp- Host:
shaileshvisionaryastrologer.com - Port:
21 - Username:
AstroVision - Password:
Ve!0mh16
Extracted
lumma
https://suggestyuoz.biz/api
Targets
-
-
Target
34.ps1
-
Size
1KB
-
MD5
68bddac7ac658f9f72b58f984399756f
-
SHA1
f424b6c82945ddb068f8f7bc2f6ff2a72f5bf2d9
-
SHA256
cec8edd890e127b429f7801501f8637036048ca6f2d3c64b2c4d64f2168b07fd
-
SHA512
cb56d4642ec4cf77a96c059094cc9261a7136bdce4c313dcacae6e94db6e320dafb9be5498e33524315a21fc0d10a4c7d663b3bd096957c773df7de9c34d8d98
-
Lumma family
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-