General
-
Target
P4IZC_random.exe
-
Size
541KB
-
Sample
250126-qbppcstjhn
-
MD5
bbd4d7f2bc61c62c5f165e1aae3ca558
-
SHA1
8608e74b6eea632be57c61f617b2136dd3500e9d
-
SHA256
cb98e04837d3eb000c1dc1810008b9cda08510d9f06b0a7bfa04746d91787a42
-
SHA512
f10f1894b98e0b3e6e841e184d72d5950103651c2e4d08b779cea9fa22432266ed72587dcdb706298c5c1521289643d96056932cbfc78d458532b6188ffef870
-
SSDEEP
12288:jY6R+JQXjAnN3ykQO4L3yq7HFe9/jAoaLSsysL2nm60j:1TARQOS3ySY9/jA2lf0
Static task
static1
Behavioral task
behavioral1
Sample
P4IZC_random.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://toppyneedus.biz/api
Targets
-
-
Target
P4IZC_random.exe
-
Size
541KB
-
MD5
bbd4d7f2bc61c62c5f165e1aae3ca558
-
SHA1
8608e74b6eea632be57c61f617b2136dd3500e9d
-
SHA256
cb98e04837d3eb000c1dc1810008b9cda08510d9f06b0a7bfa04746d91787a42
-
SHA512
f10f1894b98e0b3e6e841e184d72d5950103651c2e4d08b779cea9fa22432266ed72587dcdb706298c5c1521289643d96056932cbfc78d458532b6188ffef870
-
SSDEEP
12288:jY6R+JQXjAnN3ykQO4L3yq7HFe9/jAoaLSsysL2nm60j:1TARQOS3ySY9/jA2lf0
-
Lumma family
-
Suspicious use of SetThreadContext
-