General

  • Target

    7b9e17219d79e0535177f413836088cf5fafb5854f3d2b18856a9834e0ef2084

  • Size

    172KB

  • Sample

    230116-kkdqkagb9w

  • MD5

    6a8e8f4e9278e5fa813a033f9ee60606

  • SHA1

    0a2da262023e6b0757324a95a54261f1c26ed3a3

  • SHA256

    cae5ae1c8a1904a0c041d925363a240d08ffa2cbf7146a03dd2b3943aaba85c6

  • SHA512

    ea257fc881d8e0ba2964c0c920e339634e93b95e96b070db2303e40ddc10b360a04679d0709f3882b737d34c5624dcff1cf455cffeac9956396f7877e1f51968

  • SSDEEP

    3072:Eg8g0xG36I4m4nQXJDKHCa9k9QCC7wxieRuzXlRfGCqL8o3pYoX96drjg6GNxYlx:EqD6KVck9QCJxPYX/GlQCRcjDGNxYlzF

Score
10/10

Malware Config

Extracted

Family

lumma

C2

77.73.134.68

Targets

    • Target

      7b9e17219d79e0535177f413836088cf5fafb5854f3d2b18856a9834e0ef2084

    • Size

      248KB

    • MD5

      e2d40676fa2b1dd7966d50ccbf5acbde

    • SHA1

      e54498df173d571cff586b7594762b054ced5ea6

    • SHA256

      7b9e17219d79e0535177f413836088cf5fafb5854f3d2b18856a9834e0ef2084

    • SHA512

      3b70d0ad0b660360381654a63bc4989a982ba505ae2183bc4b31573c083eb703c8c01ae57df7c48a4dde937774067fbd7680054c90b50abcb7e056bc445059df

    • SSDEEP

      3072:9MX2Ute7uzcCd57wA9ZuRuzXlRfG8qL8o3pYoA3P1i:9IPzQAuYX/GfQCR

    Score
    10/10
    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks