General
-
Target
Bootstrapper_v2.exe
-
Size
7.3MB
-
Sample
250127-te4jgawlgz
-
MD5
1105290bf5924c277b28094ae7db77ff
-
SHA1
ee1e6c8dcf539e4472ce8a24c970944b0419481a
-
SHA256
2cc1be4727a2067781f7946e98876fefbb0a2873173631c82ab20fd46655715c
-
SHA512
b44f2b3c9c3addce6a561cc04f3f79cad956d4462b8946a9bf194d3aadebf98b80b68caf0ae62b4774adca9b3e2594ac3b1f31397521ad3d81c9c8ebb26c4c36
-
SSDEEP
49152:hNXuGS7OkWO857MrJI2xqdxHEZo4mmnMIAtUXlNqbNg5tf:hNXuGSak2V
Static task
static1
Behavioral task
behavioral1
Sample
Bootstrapper_v2.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://toppyneedus.biz/api
Targets
-
-
Target
Bootstrapper_v2.exe
-
Size
7.3MB
-
MD5
1105290bf5924c277b28094ae7db77ff
-
SHA1
ee1e6c8dcf539e4472ce8a24c970944b0419481a
-
SHA256
2cc1be4727a2067781f7946e98876fefbb0a2873173631c82ab20fd46655715c
-
SHA512
b44f2b3c9c3addce6a561cc04f3f79cad956d4462b8946a9bf194d3aadebf98b80b68caf0ae62b4774adca9b3e2594ac3b1f31397521ad3d81c9c8ebb26c4c36
-
SSDEEP
49152:hNXuGS7OkWO857MrJI2xqdxHEZo4mmnMIAtUXlNqbNg5tf:hNXuGSak2V
-
Lumma family
-
Suspicious use of SetThreadContext
-