Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-01-2025 11:31

General

  • Target

    6b801eb136e5444060a0a79c1a3f03f5200cfd101dca1970fd62e19bb800944e.exe

  • Size

    23.5MB

  • MD5

    0dfd4fec5f6fce11f50d08b92485f51f

  • SHA1

    fa31151a611e2504b58bfb3d7f31c8fbdb273295

  • SHA256

    6b801eb136e5444060a0a79c1a3f03f5200cfd101dca1970fd62e19bb800944e

  • SHA512

    75508cd102690a393900b263e86b20a791d8bcee060a5fe37582c7573f04c86f52ef98b39239e5a9a5d2107fdb3f01c50882cd3f3289ea39121d5a9c1c182d9d

  • SSDEEP

    393216:BxsCoIoxek7zIG2ZN28ylZlIR6vc6WI+Nf+fuUUun6Rj/fU3iKYpRyXZyA:ch6jE3iKYDMn

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://caffegclasiqwp.shop/api

https://stamppreewntnq.shop/api

https://stagedchheiqwo.shop/api

https://millyscroqwp.shop/api

https://evoliutwoqm.shop/api

https://condedqpwqm.shop/api

https://traineiwnqo.shop/api

https://locatedblsoqp.shop/api

https://serveghaweqjm.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b801eb136e5444060a0a79c1a3f03f5200cfd101dca1970fd62e19bb800944e.exe
    "C:\Users\Admin\AppData\Local\Temp\6b801eb136e5444060a0a79c1a3f03f5200cfd101dca1970fd62e19bb800944e.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2232-1-0x0000000001480000-0x00000000014D7000-memory.dmp

    Filesize

    348KB

  • memory/2232-3-0x0000000003590000-0x00000000035E9000-memory.dmp

    Filesize

    356KB

  • memory/2232-0-0x0000000001480000-0x00000000014D7000-memory.dmp

    Filesize

    348KB

  • memory/2232-4-0x0000000003590000-0x00000000035E9000-memory.dmp

    Filesize

    356KB