Behavioral task
behavioral1
Sample
2308-3-0x00000000010B0000-0x0000000001555000-memory.exe
Resource
win7-20240903-en
General
-
Target
2308-3-0x00000000010B0000-0x0000000001555000-memory.dmp
-
Size
4.6MB
-
MD5
e990397fa2c55ec70b0a446327a40aa5
-
SHA1
c330896f50ab0587f4aea097a03d7f8a1bdc06be
-
SHA256
0747cac4c07fb260eec3098f521e0dad5effb4974f458dbdcb4bdd9777527248
-
SHA512
b982168306ef0de64637897f1f633625539226f0eb03a8bd5931540e546df8fcf11f3d701dec25eab085ae3df269a88c3fd4e2917a5001cc933562fb5df8148e
-
SSDEEP
98304:nuaqSKBPVY9/JVHG4CPhaR0uSFjp5dYwev7:urWHXahGKFjp5dYt
Malware Config
Extracted
lumma
https://clearancek.site
https://licendfilteo.site
https://spirittunek.store
https://bathdoomgaz.store
https://studennotediw.store
https://dissapoiznw.store
https://eaglepawnoy.store
https://mobbipenju.store
Signatures
-
Lumma family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2308-3-0x00000000010B0000-0x0000000001555000-memory.dmp
Files
-
2308-3-0x00000000010B0000-0x0000000001555000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 151KB - Virtual size: 372KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hstlhgay Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rnnkdlyx Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE