Behavioral task
behavioral1
Sample
3020-0-0x0000000000400000-0x000000000046F000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3020-0-0x0000000000400000-0x000000000046F000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
3020-0-0x0000000000400000-0x000000000046F000-memory.dmp
-
Size
444KB
-
MD5
217625a14b92fed5421d7edb13a6bc25
-
SHA1
e10b3ca4f4a08b7ad0b56be794bc60ea37be9169
-
SHA256
2afc2ccd2d1b80ba863cbb2c5d88c06921153ffa7e9022391cb48cf47056f741
-
SHA512
6ae3b8cff1971ebabb0e8d84cc7f9b92f4639464e82f74745ba1dda18328e26102c36cff62819df0fa223d3fb3d3b1ad560e22869499446dc186916f808b64b8
-
SSDEEP
6144:nsI5zsy8X8BsPkH6ImKTNyU9QSMucbkU7hTfKEb1ZZ+BIbw7/48i9oYawX+VvSaI:nFxOiWBU9auiBd1eSw7/4t9oYpo7ztg
Malware Config
Extracted
lumma
185.99.133.246
Signatures
-
Detect Lumma Stealer payload V2 1 IoCs
resource yara_rule sample family_lumma_V2 -
Lumma family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3020-0-0x0000000000400000-0x000000000046F000-memory.dmp
Files
-
3020-0-0x0000000000400000-0x000000000046F000-memory.dmp.exe windows:6 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 370KB - Virtual size: 369KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ