Behavioral task
behavioral1
Sample
temka.dll
Resource
win7-20240221-en
General
-
Target
temka.dll
-
Size
170KB
-
MD5
9635c0b506de97b5aa38ec70edeb47a4
-
SHA1
f7544a9ecc2383d92fef086dd6c4a9acc2ce4d8f
-
SHA256
a23e5988987b35ac0faa6d36e45204879a9d8094cb59e2e0ec6d3dc24164984f
-
SHA512
249b811a944001d9ce08dc8f366d5ca7754c76189ddebb0707410ae70340f240510258489544d21b4b82970e400048ad80cc37f24445dded8980e2042ad8e948
-
SSDEEP
3072:En8ZQUV0egZZOTUj93VuHziZMd86ZvsOvwI8Pjne6ra9KB/BjTwA7Ev3Pv9:E9UV0egeTw9344I86ZvsODseM/Ba3v9
Malware Config
Signatures
-
Detect Lumma Stealer payload V4 1 IoCs
resource yara_rule sample family_lumma_v4 -
Lumma family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource temka.dll
Files
-
temka.dll.dll windows:6 windows x86 arch:x86
0b26a122d34cbb1481fb15087d4c61dc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
RemoveVectoredExceptionHandler
VirtualProtect
GetCurrentProcess
VirtualAlloc
Thread32Next
Thread32First
ResumeThread
GetModuleHandleA
OpenProcess
CreateToolhelp32Snapshot
MultiByteToWideChar
DeleteFileA
CloseHandle
K32GetModuleInformation
CreateThread
AddVectoredExceptionHandler
GetProcAddress
GetCurrentProcessId
WideCharToMultiByte
OpenThread
WriteConsoleW
SetEndOfFile
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
Sleep
GetCurrentThreadId
SuspendThread
GetThreadContext
SetThreadContext
FlushInstructionCache
GetModuleHandleW
VirtualFree
VirtualQuery
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
RaiseException
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
GetLastError
GetProcessHeap
FreeLibrary
RtlUnwind
InterlockedFlushSList
GetModuleFileNameW
LoadLibraryExW
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ReadFile
GetDriveTypeW
GetFullPathNameW
ExitProcess
GetModuleHandleExW
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetStdHandle
GetFileType
CompareStringW
LCMapStringW
GetCurrentDirectoryW
GetTimeZoneInformation
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetStringTypeW
CreateFileW
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetFileSizeEx
HeapSize
DecodePointer
user32
MessageBeep
Sections
.text Size: 126KB - Virtual size: 126KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 248B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ