Analysis

  • max time kernel
    39s
  • max time network
    40s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-01-2025 08:13

General

  • Target

    Reborn (2025).zip

  • Size

    21.3MB

  • MD5

    450dde0ccb539d2aa5b22fc3af72a7b3

  • SHA1

    11a57f9b8a0bdbb5b7ae506dade051ec3ab8c4cb

  • SHA256

    1f831d8bf35ec5f5a8312bdf75061e4bfb7d8bdff4a096473db027b55002228a

  • SHA512

    9ee4b53bcc3a8f9f12c72950ac1658462be87afb6af9b12fb5284fb6a5c79611b6810ad98ee80b732a572194a14319efcaf1514cc443e5f569273cec8f3807f4

  • SSDEEP

    393216:ObBv0SoGMUtNEcqUWeOQi7ItRai6DjPy/LEy+Yaedz1ERL2F3r/ByP:O1FoboEZUWumSRaDjoQy+Yvgi1yP

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Reborn (2025).zip"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3412
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4140
    • C:\Users\Admin\Desktop\Reborn\Loader.exe
      "C:\Users\Admin\Desktop\Reborn\Loader.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:996
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:3440

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Desktop\Reborn\Loader.exe

      Filesize

      4.9MB

      MD5

      72d7c55385c2184f0911d7bc4e6e06d9

      SHA1

      6371e379c0f1a3cb6aa43f2dff28320ccf01d54a

      SHA256

      adfdf948a863b8bfcda9e6551202fd3b65120ebbe8171d56a0256c52f0fe4057

      SHA512

      a810b680d3794b8330b8a29132601601a3ba94ff6eb7efeb2634edfb7b015c935eccb3a0bba075df01564da8e8079add3a94eac7f6ccea5e97c9d014e0f6ed49

    • memory/3440-42-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/3440-43-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/3440-44-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/3440-45-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/3440-46-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB