Analysis

  • max time kernel
    217s
  • max time network
    303s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18-04-2024 22:49

General

  • Target

    7fea54a29707260f6d2d02534a8c4b1c2ea2fb43b98a1125cec28b7b0a430df3.exe

  • Size

    360KB

  • MD5

    945b79b0cb128f7a270cd4b793c01491

  • SHA1

    e9b14f2d7de74478fb4469c9022a5f346a01c273

  • SHA256

    7fea54a29707260f6d2d02534a8c4b1c2ea2fb43b98a1125cec28b7b0a430df3

  • SHA512

    7b41c90881d83a2ef78bb243c9d4252e446c4531b640d1a9f0ebbdfe69fe6099ac4240680140c3dfc6fe86710a51d7fb516781c3a4a9e433fb2ce12d02818616

  • SSDEEP

    6144:MLjsoc8qfLllfHNpjwKL+D9ruHjw9unJ3W:M/so03HNpk4OxuX

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://exceptionwillapews.shop/api

https://entitlementappwo.shop/api

https://economicscreateojsu.shop/api

https://pushjellysingeywus.shop/api

https://absentconvicsjawun.shop/api

https://suitcaseacanehalk.shop/api

https://bordersoarmanusjuw.shop/api

https://mealplayerpreceodsju.shop/api

https://wifeplasterbakewis.shop/api

Signatures

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7fea54a29707260f6d2d02534a8c4b1c2ea2fb43b98a1125cec28b7b0a430df3.exe
    "C:\Users\Admin\AppData\Local\Temp\7fea54a29707260f6d2d02534a8c4b1c2ea2fb43b98a1125cec28b7b0a430df3.exe"
    1⤵
      PID:4620

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4620-1-0x0000000002EC0000-0x0000000002FC0000-memory.dmp

      Filesize

      1024KB

    • memory/4620-2-0x0000000002D70000-0x0000000002DBC000-memory.dmp

      Filesize

      304KB

    • memory/4620-3-0x0000000000400000-0x0000000002C3D000-memory.dmp

      Filesize

      40.2MB

    • memory/4620-4-0x0000000000400000-0x0000000002C3D000-memory.dmp

      Filesize

      40.2MB

    • memory/4620-5-0x0000000002D70000-0x0000000002DBC000-memory.dmp

      Filesize

      304KB