Malicious
Classifications
Spyware
Threat Names
Lumma
Dynamic Analysis Report
Created on 2024-03-07T08:50:28+00:00
2692-146-0x0000000000400000-0x0000000000477000-memory.exe
Windows Exe (x86-32)
Remarks (1/1)
(0x02000008): One or more processes crashed during the analysis. Analysis results may be incomplete.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\RDhJ0CNFevzX\Desktop\2692-146-0x0000000000400000-0x0000000000477000-memory.exe | Sample File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x00442E5C |
Size Of Code | 0x00062C00 |
Size Of Initialized Data | 0x0000F400 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-11 20:05 (UTC+2) |
Sections (6)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x00401000 | 0x00062A71 | 0x00062C00 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.77 |
.rdata | 0x00464000 | 0x0000C51C | 0x0000C600 | 0x00063000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.3 |
.data | 0x00471000 | 0x00001824 | 0x00000C00 | 0x0006F600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.73 |
.00cfg | 0x00473000 | 0x00000008 | 0x00000200 | 0x00070200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 2.4 |
.voltbl | 0x00474000 | 0x000000A6 | 0x00000200 | 0x00070400 | 1.83 | |
.reloc | 0x00475000 | 0x00001F20 | 0x00002000 | 0x00070600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.92 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
Lumma_C2 | LummaC2 Stealer | Spyware |
5/5
|
...
|