Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2024, 01:03

General

  • Target

    0db31a762537c1502aeb19710e535ceb88cf80923e3fe51cb23b57fb73a11ce0.exe

  • Size

    7.4MB

  • MD5

    6ffac7011a232b7107961309d65064e2

  • SHA1

    472c3ddc6a8c93c51fbd2f07c60e41473de36d3f

  • SHA256

    0db31a762537c1502aeb19710e535ceb88cf80923e3fe51cb23b57fb73a11ce0

  • SHA512

    a3380269f21f566c9d5b6297b3ef9324c23d1f74db0444b9235dc87844f5a3054fe7ccb96d5496c124bd961c47de46b766ab33fcdd762e979dc9812ae0d12911

  • SSDEEP

    98304:SxHORE06p2b8ME/bg84xg3tKTZaqjJWJnfEWTp0GoUitS:yO2pM8ME/bHKTZaoSfEaOGoxt

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://surprisemakedjukenw.shop/api

https://sofaprivateawarderysj.shop/api

https://lineagelasserytailsd.shop/api

https://tendencyportionjsuk.shop/api

https://headraisepresidensu.shop/api

https://appetitesallooonsj.shop/api

https://minorittyeffeoos.shop/api

https://prideconstituiiosjk.shop/api

https://smallelementyjdui.shop/api

Signatures

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0db31a762537c1502aeb19710e535ceb88cf80923e3fe51cb23b57fb73a11ce0.exe
    "C:\Users\Admin\AppData\Local\Temp\0db31a762537c1502aeb19710e535ceb88cf80923e3fe51cb23b57fb73a11ce0.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4708

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4708-1-0x00000000001F0000-0x0000000000C8F000-memory.dmp

    Filesize

    10.6MB

  • memory/4708-2-0x0000000000243000-0x00000000004D0000-memory.dmp

    Filesize

    2.6MB

  • memory/4708-0-0x0000000000DD0000-0x0000000000DD1000-memory.dmp

    Filesize

    4KB

  • memory/4708-4-0x00000000001F0000-0x0000000000C8F000-memory.dmp

    Filesize

    10.6MB

  • memory/4708-5-0x00000000001F0000-0x0000000000C8F000-memory.dmp

    Filesize

    10.6MB

  • memory/4708-6-0x0000000000243000-0x00000000004D0000-memory.dmp

    Filesize

    2.6MB