General
-
Target
Nexol.exe
-
Size
6.5MB
-
Sample
250221-146tfs1ngw
-
MD5
ffeabed249dd14435b8d7e7af599c360
-
SHA1
7049c3cd0c2f6246366cdab6754351621f7d90f5
-
SHA256
a54e6ab607cb2df90bef8f59df83dc7e849d1b41ebf115a77deab66883515283
-
SHA512
733f20724178c47620a4653392b9b91835451f56e75ae9158fa275570c13576782f4caddae0d89499c74aef7d17313df2b9c767532b10fc10544b4d4a9295653
-
SSDEEP
49152:bjWiB2zkDxAOorujyGiZFrMhooccmpL1n4quebID0lOAZZTEmgPzmwx+K7WAWwOt:bjWiBriSjIXM81nxbprl5w
Static task
static1
Behavioral task
behavioral1
Sample
Nexol.exe
Resource
win7-20240729-en
Malware Config
Extracted
lumma
https://prideforgek.fun/api
Targets
-
-
Target
Nexol.exe
-
Size
6.5MB
-
MD5
ffeabed249dd14435b8d7e7af599c360
-
SHA1
7049c3cd0c2f6246366cdab6754351621f7d90f5
-
SHA256
a54e6ab607cb2df90bef8f59df83dc7e849d1b41ebf115a77deab66883515283
-
SHA512
733f20724178c47620a4653392b9b91835451f56e75ae9158fa275570c13576782f4caddae0d89499c74aef7d17313df2b9c767532b10fc10544b4d4a9295653
-
SSDEEP
49152:bjWiB2zkDxAOorujyGiZFrMhooccmpL1n4quebID0lOAZZTEmgPzmwx+K7WAWwOt:bjWiBriSjIXM81nxbprl5w
-
Lumma family
-
Suspicious use of SetThreadContext
-