General

  • Target

    0441aa20a4a9814d4574612494d743039e5e735204cd6b514a636cf77bbc831f

  • Size

    172KB

  • Sample

    230116-mjmcesdf48

  • MD5

    83b1a00317be3e9e934d36b56701b38c

  • SHA1

    0ac41962587cea19bc96ef89e2691f1a103d3550

  • SHA256

    b5c32c8eced221ec5b54c57a027f9fee57f431739cdac9de3d3008b84c4cca97

  • SHA512

    0a9429d410671e94262f11c4aa561dde3983956a0e8b0bef1a4add730faba49cf55f7baf74a95e6f93f5e184285dd050716a7e4fc0b4877ce2f54fb6611ec0fb

  • SSDEEP

    3072:nFAZkmIgl++bbktqukWDhx+Ooq4lxne2eWxZ39jYELdO5qpDMoW:FAWmIgl+b1kWDhx+Ooq8xneHWj31rdU3

Score
10/10

Malware Config

Extracted

Family

lumma

C2

77.73.134.68

Targets

    • Target

      0441aa20a4a9814d4574612494d743039e5e735204cd6b514a636cf77bbc831f

    • Size

      248KB

    • MD5

      a28c87cd2935ac25b99579652739dc79

    • SHA1

      026397e31dee7fe017929ac7d545faa4f9ad6dfb

    • SHA256

      0441aa20a4a9814d4574612494d743039e5e735204cd6b514a636cf77bbc831f

    • SHA512

      3f0f3d701685840fd1a3995573297909258153ed22d109f566e79681357451597cd7b7b04e54fa3a69819d20e95588d4d3a26dd7a77798cee2d9663c18293cbf

    • SSDEEP

      3072:hCXGo0qeoFd5GmHPZUkWi5uIcoq4lxn22eWxZ39jYEBLCYi:hCUrSGkWi/coq8xn2HWj31I

    Score
    10/10
    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks