General
-
Target
frfr.txt
-
Size
1KB
-
Sample
250126-1ds5nswkgp
-
MD5
a2d3f2b64fba7c4765a7ad0ec1b904f2
-
SHA1
fb1cb2713371f71460efaeb0591592a570bec41a
-
SHA256
232f7d6f42b18e31e5e858091e059a21876ef809b5d153e910ed715ec467496c
-
SHA512
36f4be6bf302ba1e7e23008f799891681fa29876d8a801ef31feb4d4696ccf64d9b5112ff15025412e4f332d8274083b39ce54201855bc3c85a44a05a438915b
Static task
static1
Malware Config
Extracted
Family
lumma
C2
https://toppyneedus.biz/api
Targets
-
-
Target
frfr.txt
-
Size
1KB
-
MD5
a2d3f2b64fba7c4765a7ad0ec1b904f2
-
SHA1
fb1cb2713371f71460efaeb0591592a570bec41a
-
SHA256
232f7d6f42b18e31e5e858091e059a21876ef809b5d153e910ed715ec467496c
-
SHA512
36f4be6bf302ba1e7e23008f799891681fa29876d8a801ef31feb4d4696ccf64d9b5112ff15025412e4f332d8274083b39ce54201855bc3c85a44a05a438915b
-
Lumma family
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-