General
-
Target
alex2022.exe
-
Size
1.1MB
-
Sample
250305-kchpjstwdy
-
MD5
0984009f07548d30f9df551472e5c399
-
SHA1
a1339aa7c290a7e6021450d53e589bafa702f08a
-
SHA256
80ec0ec77fb6e4bbb4f01a2d3b8d867ddd0dfe7abdb993ef1401f004c18377be
-
SHA512
23a6a8d0d5c393adc33af6b5c90a4dd0539015757e2dbbd995fd5990aff516e0e2d379b7903e07399c476a7ec9388ed5253252276df6053063d2ed08f1a351e9
-
SSDEEP
24576:ChE6LP3s7/2Yz96q35BH5cKxnqERzU3++25j2/D+zOLWJqn82xc3++25j2/D+zO3:crT3s7/vBZ35BH5cKxnqERzU3n2hjKqH
Static task
static1
Behavioral task
behavioral1
Sample
alex2022.exe
Resource
win7-20240729-en
Malware Config
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://drive-connect.cyou/api
Targets
-
-
Target
alex2022.exe
-
Size
1.1MB
-
MD5
0984009f07548d30f9df551472e5c399
-
SHA1
a1339aa7c290a7e6021450d53e589bafa702f08a
-
SHA256
80ec0ec77fb6e4bbb4f01a2d3b8d867ddd0dfe7abdb993ef1401f004c18377be
-
SHA512
23a6a8d0d5c393adc33af6b5c90a4dd0539015757e2dbbd995fd5990aff516e0e2d379b7903e07399c476a7ec9388ed5253252276df6053063d2ed08f1a351e9
-
SSDEEP
24576:ChE6LP3s7/2Yz96q35BH5cKxnqERzU3++25j2/D+zOLWJqn82xc3++25j2/D+zO3:crT3s7/vBZ35BH5cKxnqERzU3n2hjKqH
-
Lumma family
-
Suspicious use of SetThreadContext
-