Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/04/2024, 08:01

General

  • Target

    ada9f1952740e531941489dedf30d9308f3ad83fa92bfc5abc42e1e4450a4814.exe

  • Size

    352KB

  • MD5

    e9cf2b85c3cd785b251de43861bbb06e

  • SHA1

    0b69d1e73a1947b73ea50b1f3e951bc5a9e61ba5

  • SHA256

    ada9f1952740e531941489dedf30d9308f3ad83fa92bfc5abc42e1e4450a4814

  • SHA512

    1cf8a9d301aff48fa128d16ac3198f942586db38a9b1c59a36b9a0760e56a9d132a7f76fc2f70f33b4cbbc15f01abb971b52f92b7fbe038a5ba7c27e947d0101

  • SSDEEP

    6144:HVHViN66w3D1D2cq9qeZ2T4teXP3HsjcDbkiHERh8nTr:1HViNjyFoqesT4te/cgXH+h8nTr

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://strollheavengwu.shop/api

https://productivelookewr.shop/api

https://tolerateilusidjukl.shop/api

https://shatterbreathepsw.shop/api

https://shortsvelventysjo.shop/api

https://incredibleextedwj.shop/api

https://alcojoldwograpciw.shop/api

https://liabilitynighstjsko.shop/api

https://demonstationfukewko.shop/api

Signatures

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Program crash 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ada9f1952740e531941489dedf30d9308f3ad83fa92bfc5abc42e1e4450a4814.exe
    "C:\Users\Admin\AppData\Local\Temp\ada9f1952740e531941489dedf30d9308f3ad83fa92bfc5abc42e1e4450a4814.exe"
    1⤵
      PID:4788
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 388
        2⤵
        • Program crash
        PID:4320
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4788 -ip 4788
      1⤵
        PID:748

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/4788-1-0x00000000040F0000-0x00000000041F0000-memory.dmp

              Filesize

              1024KB

            • memory/4788-2-0x0000000005C60000-0x0000000005CAB000-memory.dmp

              Filesize

              300KB

            • memory/4788-3-0x0000000000400000-0x0000000004049000-memory.dmp

              Filesize

              60.3MB

            • memory/4788-4-0x0000000005C60000-0x0000000005CAB000-memory.dmp

              Filesize

              300KB