General

  • Target

    1696-54-0x0000000000070000-0x00000000000A9000-memory.dmp

  • Size

    228KB

  • MD5

    206edc6c01daf8bc26e9580c94e16c35

  • SHA1

    91b6b4bfad5cba68cb1a14b58522c72b17fbc3a4

  • SHA256

    f93e94d2c91b12461691da812d668b6b5d7a80c3968b2a4bd45fe8501f41f8af

  • SHA512

    3e3c16a70b3c7857ccb943ad262f05b456cf7895720fa99baa9c719276277d350734edd88808936b215b2db8a1f0861bb140f7be5e0874435cfcb3b5937a93db

  • SSDEEP

    3072:CvRen9jpcm91oZc6tKo3VCidiwgotGJ3xksl6KiEddiQVoA0XGsOM2XuRrQp:CvRenRz/Vo32bksQEdZ6LXGSQp

Score
10/10

Malware Config

Extracted

Family

lumma

C2

82.117.255.127

Signatures

  • Detect Lumma Stealer payload V2 1 IoCs
  • Detect Lumma Stealer payload V4 1 IoCs
  • Lumma family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1696-54-0x0000000000070000-0x00000000000A9000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections