Behavioral task
behavioral1
Sample
2188-88-0x0000000000400000-0x000000000045B000-memory.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
2188-88-0x0000000000400000-0x000000000045B000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
2188-88-0x0000000000400000-0x000000000045B000-memory.dmp
-
Size
364KB
-
MD5
705f318c0e021f04f4ddfeb33acb2371
-
SHA1
c264b5d4a50f3cb9f55163b9410ffd96d203c456
-
SHA256
59aa33a8f9c452bd327f836342f8f341f21d3fd264ca86d594227525763abd65
-
SHA512
e9b314075c298cdff1379dbe123587e18b447fcdcdd1e6c6d0608ccd1f8041f8e079bf19b8947f1543af3436f4fcb6d0b24478aceb4119de4c78124b08a26732
-
SSDEEP
6144:9Wl4LFa4hSjw81a3Y2xGyc3rFG676HfmB70IqmxuFlqSXS6EiP/:9W4Rl81exXc3s676HOBxqm8HqS5
Malware Config
Extracted
lumma
gstatic-node.io
Signatures
-
Lumma family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2188-88-0x0000000000400000-0x000000000045B000-memory.dmp
Files
-
2188-88-0x0000000000400000-0x000000000045B000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 299KB - Virtual size: 299KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ