Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
16-01-2023 09:39
Static task
static1
Behavioral task
behavioral1
Sample
c16ba0f2004c45a448d524867b6dfac5.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
General
-
Target
c16ba0f2004c45a448d524867b6dfac5.exe
-
Size
276KB
-
MD5
c16ba0f2004c45a448d524867b6dfac5
-
SHA1
4511810aaa7ce1542ee94adf00e4f510025a189d
-
SHA256
6b8838ea9bff0a51596fe3c2b77b3b0a5402c23cc87692d3648d8f4a28ce705d
-
SHA512
460237872e9bcf0e70f3d719b7321171f6969bbb3dac1d1d744b8be590a59f9fcba3cb1331e7c19448f4c4f45a340dd704209154e87f20fcdc80d0b8489a50cc
-
SSDEEP
6144:qHZfDLuw3OQibtDGS6q8QsVBLNLTE7y0+FtsSsU4zqQna:qHZ7CweQAhz8RVpNLTE+0mtkFP
Malware Config
Extracted
Family
lumma
C2
77.73.134.68
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1692-54-0x00000000008CE000-0x00000000008E8000-memory.dmpFilesize
104KB
-
memory/1692-55-0x0000000000220000-0x000000000024A000-memory.dmpFilesize
168KB
-
memory/1692-56-0x0000000075661000-0x0000000075663000-memory.dmpFilesize
8KB
-
memory/1692-57-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/1692-58-0x00000000008CE000-0x00000000008E8000-memory.dmpFilesize
104KB
-
memory/1692-59-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB