Behavioral task
behavioral1
Sample
03b1a6590eacbb30e76a81404986df54.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
03b1a6590eacbb30e76a81404986df54.dll
Resource
win10v2004-20231215-en
General
-
Target
03b1a6590eacbb30e76a81404986df54
-
Size
302KB
-
MD5
03b1a6590eacbb30e76a81404986df54
-
SHA1
18517ccedf8fd726bfa955f92e725e9da606c220
-
SHA256
5aabb85750d89d8a09b6662184dfa64836615647dfbcdf1c3e942c52852986e8
-
SHA512
812e1dc2eab8d59721e864a40ef56cdc4aac052954672ffb61fb30a0d44bc697ca168a97cb0dda73ffaafabb65ad026dfe42ceaab38c198da3465ecb256442f8
-
SSDEEP
6144:kOgptk3xe/YFSrVPuSkeDWqVI4NydaIHmcpvlO:kc3x4VW7eDWqVI4NoaupdO
Malware Config
Signatures
-
Detect Lumma Stealer payload V4 1 IoCs
resource yara_rule sample family_lumma_v4 -
Lumma family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03b1a6590eacbb30e76a81404986df54
Files
-
03b1a6590eacbb30e76a81404986df54.dll windows:6 windows x86 arch:x86
f265a204010a4201076c7c6c8571dfc1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
DisableThreadLibraryCalls
GetModuleHandleA
VirtualAlloc
VirtualProtect
VirtualFree
FreeLibrary
GetProcAddress
LoadLibraryA
WriteConsoleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
RaiseException
InterlockedFlushSList
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapFree
HeapAlloc
CloseHandle
GetConsoleMode
SetFilePointerEx
GetStdHandle
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
GetProcessHeap
SetStdHandle
FlushFileBuffers
WriteFile
GetConsoleCP
CreateFileW
GetStringTypeW
HeapSize
HeapReAlloc
DecodePointer
Sections
.text Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 226KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ