General

  • Target

    4424-40-0x0000000000610000-0x0000000000AC0000-memory.dmp

  • Size

    4.7MB

  • MD5

    fdf79cd7189d1ecf1871d3960c3a19b9

  • SHA1

    37c7b02d9810d6c80098ea528802cf7e5627522f

  • SHA256

    d6371681bbb33d27dfa954cf6fee2b88ee9d7527e453dc26428ac954b5f651c3

  • SHA512

    1bd5eb21c224fb287878d6fe20083a26985e0fbe6ce6563299031fb0c4919caea070ffe19198d36f327e6470bf7c216527b7b49d35c857c716272920be35f55c

  • SSDEEP

    98304:OZINwVUkiFsQnYqGkPdGzCiNarigL4lYVvKGrQNWNvHbGXsZA0Dar:MIN9V2kPdGNNdGdKAJ70s20Da

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://powerful-avoids.sbs

https://motion-treesz.sbs

https://disobey-curly.sbs

https://leg-sate-boat.sbs

https://story-tense-faz.sbs

https://blade-govern.sbs

https://occupy-blushi.sbs

https://frogs-severz.sbs

https://property-imper.sbs

Signatures

  • Lumma family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4424-40-0x0000000000610000-0x0000000000AC0000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections