Analysis

  • max time kernel
    92s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2024 19:18

General

  • Target

    06abfbd278feaa3bb47fd0efb97956ea737d691f66595a56e9d80fa92f3cad45.dll

  • Size

    599KB

  • MD5

    357c4ff0144052f2ab0b3eca8055cc31

  • SHA1

    92ff338ee607699ebfb6c84ae0cf336bb8324410

  • SHA256

    06abfbd278feaa3bb47fd0efb97956ea737d691f66595a56e9d80fa92f3cad45

  • SHA512

    e4846033c664c54bc2a4fc7641625959ff6bdd9b19b6ad111231d7bc50e25f835bb5acc11af3e4d6a13348cd63016efffea5a89167bc6ccc2525f38545765973

  • SSDEEP

    12288:Cz+4JyGMalyMNk8thPB2EbEPA99drekfl/EUGygoOV+uyJdkIKqL1hMM5:CFJy0Tk6B2EbEo9/XflyXonu0KqL1hF

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://offybirhtdi.sbs

https://activedomest.sbs

https://arenbootk.sbs

https://mediavelk.sbs

https://definitib.sbs

https://elaboretib.sbs

https://strikebripm.sbs

https://ostracizez.sbs

https://withdrwblon.cyou

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\06abfbd278feaa3bb47fd0efb97956ea737d691f66595a56e9d80fa92f3cad45.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4684
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\06abfbd278feaa3bb47fd0efb97956ea737d691f66595a56e9d80fa92f3cad45.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:224
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/224-1-0x0000000077851000-0x0000000077971000-memory.dmp

    Filesize

    1.1MB

  • memory/1124-2-0x0000000000190000-0x00000000001FE000-memory.dmp

    Filesize

    440KB

  • memory/1124-8-0x0000000000190000-0x00000000001FE000-memory.dmp

    Filesize

    440KB

  • memory/1124-9-0x0000000000190000-0x00000000001FE000-memory.dmp

    Filesize

    440KB