General
-
Target
b2a10d42ed9b902a6a4a40b47da8448c9fa61f268f3ffb37d08bd5f5e213a0af
-
Size
6.2MB
-
Sample
240704-2n383awckb
-
MD5
b9265c31743db2e9698a08df7b0c5e9d
-
SHA1
aa01367b13f827a5773d0781692809ae175bc718
-
SHA256
b2a10d42ed9b902a6a4a40b47da8448c9fa61f268f3ffb37d08bd5f5e213a0af
-
SHA512
1678d62ad17ce27394599f2835f3c1f209f544fdfae4c54034e7da06936768fe487a55811d9f0919018113af50153437ea0631968814910db69df0ffda36a133
-
SSDEEP
49152:+qMb251mXUaFTyH5FYbRtQtD0gwbJBhOXg+QREJXNwrkjf5EfGd+NeDPk4A92+f9:ssyHA56IXg+TXfEfGVhgw6
Static task
static1
Behavioral task
behavioral1
Sample
b2a10d42ed9b902a6a4a40b47da8448c9fa61f268f3ffb37d08bd5f5e213a0af.exe
Resource
win7-20240221-en
Malware Config
Extracted
lumma
https://groundsmooors.shop/api
Targets
-
-
Target
b2a10d42ed9b902a6a4a40b47da8448c9fa61f268f3ffb37d08bd5f5e213a0af
-
Size
6.2MB
-
MD5
b9265c31743db2e9698a08df7b0c5e9d
-
SHA1
aa01367b13f827a5773d0781692809ae175bc718
-
SHA256
b2a10d42ed9b902a6a4a40b47da8448c9fa61f268f3ffb37d08bd5f5e213a0af
-
SHA512
1678d62ad17ce27394599f2835f3c1f209f544fdfae4c54034e7da06936768fe487a55811d9f0919018113af50153437ea0631968814910db69df0ffda36a133
-
SSDEEP
49152:+qMb251mXUaFTyH5FYbRtQtD0gwbJBhOXg+QREJXNwrkjf5EfGd+NeDPk4A92+f9:ssyHA56IXg+TXfEfGVhgw6
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-