General

  • Target

    3232-41-0x0000000000060000-0x000000000050D000-memory.dmp

  • Size

    4.7MB

  • MD5

    a499de269bd3288daf5bf5af9a9d33cb

  • SHA1

    d552d8ec148f54ea55d453f4421bb7e2f85ef98b

  • SHA256

    200f38ea6dac67f0cd21fb144c871af3915e9b2a598d9ed961db4c8affcd1b22

  • SHA512

    7adcf19e1f78cc7b472af32ddd94db2c0a45ff78d7b20fd26d08b99ae501ed422830ac6618e080110882ca15b69f81171ca6c741b216d8470f188311f0a1cdd3

  • SSDEEP

    98304:Ldk+IbVjqy+M8MDqBi3q4M0KWO2zMSx/PDqpTkgNUzf5T:hk+UPRhM0S2zMq++gNUz

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://powerful-avoids.sbs

https://motion-treesz.sbs

https://disobey-curly.sbs

https://leg-sate-boat.sbs

https://story-tense-faz.sbs

https://blade-govern.sbs

https://occupy-blushi.sbs

https://frogs-severz.sbs

https://property-imper.sbs

Signatures

  • Lumma family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3232-41-0x0000000000060000-0x000000000050D000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections