General

  • Target

    964-40-0x0000000000A30000-0x0000000000EF1000-memory.dmp

  • Size

    4.8MB

  • MD5

    3afedc06d25af8cb58a14c9e005d9f19

  • SHA1

    407b2e1412570b4b959d8053cea84567709ad486

  • SHA256

    4a232a296edf3c8e005d37fc522bd74387e41def759154335686724eb910113d

  • SHA512

    5654ddfa68cba6011766bf57cf5ed17e00604afc6d98a308324f246501e2e3f3bc6521241b356a647c069734db907bb3c266f5d42be58d3d92cac2dc42ff7534

  • SSDEEP

    98304:/xgftRglXtoQ5sKfCtCdjrBaZctpvVwTFnzDCBbC0KH2Bx7VIH:JgftQoCdwZctpvCTFyBbsy4

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://powerful-avoids.sbs

https://motion-treesz.sbs

https://disobey-curly.sbs

https://leg-sate-boat.sbs

https://story-tense-faz.sbs

https://blade-govern.sbs

https://occupy-blushi.sbs

https://frogs-severz.sbs

https://property-imper.sbs

Signatures

  • Lumma family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 964-40-0x0000000000A30000-0x0000000000EF1000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections