Analysis

  • max time kernel
    211s
  • max time network
    283s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241023-en
  • resource tags

    arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06-01-2025 02:27

General

  • Target

    Software.exe

  • Size

    522KB

  • MD5

    b6d3d4cd4d4cfa002dc13ce1bcf7bcc6

  • SHA1

    b836ebc43e184a08efcde274d7e3a9b03296c094

  • SHA256

    18a093d77082342d2818bf8378ce034d2bc7a2f79c160837ee6f384f4356e9a2

  • SHA512

    ec67167a05034ecc70e0604b898d3be9d00a48c83c792251611199e838aa7281b355a427edd3273558865786bb024c527e6ccf44f7bb08562c59e64dc722d935

  • SSDEEP

    12288:DztE0u86qlmk/345zA7Fv6vsVOzm9t/Gzr9AscP6f:DO0uYlmsozAAvsYkGzrew

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Software.exe
    "C:\Users\Admin\AppData\Local\Temp\Software.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3516
    • C:\Users\Admin\AppData\Local\Temp\Software.exe
      "C:\Users\Admin\AppData\Local\Temp\Software.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3516-0-0x0000000000520000-0x0000000000521000-memory.dmp

    Filesize

    4KB

  • memory/4480-1-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/4480-3-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/4480-4-0x00000000004F0000-0x0000000000578000-memory.dmp

    Filesize

    544KB