General

  • Target

    3932-41-0x0000000000660000-0x0000000000AE8000-memory.dmp

  • Size

    4.5MB

  • MD5

    b67cb81170cfb53bd3136d94e645364c

  • SHA1

    51e0be0c6dba83133fcbbe6551dbc1754740f04c

  • SHA256

    88e9c1a9170ded90ad9b5cbf670db9cdb7bab7a4f7301f2ea4ef7149c74c0809

  • SHA512

    de67b30aee9c094b150ac99650fb77616db01a3bb1d3be147029f78b8a06d4284f62a7d990cfbc20625cbef14630c5b8951e91c319f9f0c9e1f81b255915370d

  • SSDEEP

    98304:o0key/ozBEHg2lt1fwAJvGhKDQ705lEFXsvcp:zkey/bt9wAJuea05lE9skp

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://powerful-avoids.sbs

https://motion-treesz.sbs

https://disobey-curly.sbs

https://leg-sate-boat.sbs

https://story-tense-faz.sbs

https://blade-govern.sbs

https://occupy-blushi.sbs

https://frogs-severz.sbs

https://property-imper.sbs

Signatures

  • Lumma family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3932-41-0x0000000000660000-0x0000000000AE8000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections