Behavioral task
behavioral1
Sample
2524-71-0x0000000000C40000-0x0000000000FFB000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2524-71-0x0000000000C40000-0x0000000000FFB000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
2524-71-0x0000000000C40000-0x0000000000FFB000-memory.dmp
-
Size
3.7MB
-
MD5
fe2294dfec0889b869cea509787f05cf
-
SHA1
720b94973275e75d4386f03b0e35925bc3760dd9
-
SHA256
0eea91c760f5e3098ab279a85fb4522a9d2801da9e5e610389eaa7caf107b05c
-
SHA512
0d76d4fb7a4d02e7537863db74f131a82e48e70df6f07ee0bdb076082b47a15e58c393603c768341a59def2bc43ee176aea6ed604506e5996699866f194f41fa
-
SSDEEP
49152:s9YGBMufL2WeivYw+9jTFIi5IB5d8qhMnlgqXA2Ba2St7WyT:s9YGBMuDheiru1I5Bw2olg2A2a2SAU
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2524-71-0x0000000000C40000-0x0000000000FFB000-memory.dmp
Files
-
2524-71-0x0000000000C40000-0x0000000000FFB000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 135KB - Virtual size: 256KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 3KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 12KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Size: 174KB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 918KB - Virtual size: 920KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE