Malicious
Classifications
Spyware
Threat Names
Lumma
Dynamic Analysis Report
Created on 2024-03-12T12:27:21+00:00
dump-6543a0e7a2ea57ba5db1ac10.exe
Windows Exe (x86-32)
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\OqXZRaykm\Desktop\dump-6543a0e7a2ea57ba5db1ac10.exe | Sample File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x0047560C |
Size Of Code | 0x0008E800 |
Size Of Initialized Data | 0x0000E600 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-04-30 14:16 (UTC) |
Sections (6)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x00401000 | 0x0008E711 | 0x0008E800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.73 |
.rdata | 0x00490000 | 0x0000BBAC | 0x0000BC00 | 0x0008EC00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.14 |
.data | 0x0049C000 | 0x000017F0 | 0x00000C00 | 0x0009A800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.95 |
.00cfg | 0x0049E000 | 0x00000008 | 0x00000200 | 0x0009B400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.33 |
.voltbl | 0x0049F000 | 0x00000034 | 0x00000200 | 0x0009B600 | 2.48 | |
.reloc | 0x004A0000 | 0x00001BD0 | 0x00001C00 | 0x0009B800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 2.24 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
Lumma_C2 | LummaC2 Stealer | Spyware |
5/5
|
...
|