General
-
Target
stage1.ps1
-
Size
2KB
-
Sample
250123-zfcd9ssmbv
-
MD5
9cc29d3f5d6f3a35268cde9622b1ac9a
-
SHA1
241b1037acf1d713fc90239739428e3d3c0b9ad2
-
SHA256
a33973f5db28149436244ea6de4fb1eec9f297b795b949f293bfc322504d9510
-
SHA512
7a76b35c761708c4c01e2838ef39edeed740201274586649368bcd92e4edb230e68e6cd78880b68f6ef1f2bcb4785e45b19ab3da23d5dcaabae20b25ffacf95e
Static task
static1
Behavioral task
behavioral1
Sample
stage1.ps1
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://toppyneedus.biz/api
https://suggestyuoz.biz/api
Targets
-
-
Target
stage1.ps1
-
Size
2KB
-
MD5
9cc29d3f5d6f3a35268cde9622b1ac9a
-
SHA1
241b1037acf1d713fc90239739428e3d3c0b9ad2
-
SHA256
a33973f5db28149436244ea6de4fb1eec9f297b795b949f293bfc322504d9510
-
SHA512
7a76b35c761708c4c01e2838ef39edeed740201274586649368bcd92e4edb230e68e6cd78880b68f6ef1f2bcb4785e45b19ab3da23d5dcaabae20b25ffacf95e
-
Lumma family
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-