Analysis

  • max time kernel
    142s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/06/2024, 13:21

General

  • Target

    2024-06-20_c484a17ffc8468f2815c0798a53427b8_magniber.exe

  • Size

    5.7MB

  • MD5

    c484a17ffc8468f2815c0798a53427b8

  • SHA1

    a73a6fe8d32cfead5b39073488e3d161fb0df1ef

  • SHA256

    a65dd1ed5b9c447a7e3e2dab559478e5fb3ad7a610152c1792fd4b1f4b3a7290

  • SHA512

    be82caf808a70746f6bc95401536229643ee5d22f0d5689d2e6207191d5593b67890e46fc462de9ba24f897c01ef701b9bd78cd20cb65893544cb2c9053c196d

  • SSDEEP

    98304:anvCdBAtAOZPKZvf2H2dDgl3UZqPKCRAvMcCLSbuPr+75RF:CYAdumYglHpRpc8aSrWr

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://discoverymaidykew.shop/api

https://publicitycharetew.shop/api

https://computerexcudesp.shop/api

https://leafcalfconflcitw.shop/api

https://injurypiggyoewirog.shop/api

https://bargainnygroandjwk.shop/api

https://disappointcredisotw.shop/api

https://doughtdrillyksow.shop/api

https://facilitycoursedw.shop/api

Signatures

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-20_c484a17ffc8468f2815c0798a53427b8_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-20_c484a17ffc8468f2815c0798a53427b8_magniber.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:380
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1420 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2916

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/380-0-0x0000000001B40000-0x0000000001B91000-memory.dmp

      Filesize

      324KB

    • memory/380-3-0x0000000001B40000-0x0000000001B91000-memory.dmp

      Filesize

      324KB