General

  • Target

    tmp

  • Size

    6.4MB

  • Sample

    230313-jjxllshb62

  • MD5

    4e86343c81e09b6079449183a5289d08

  • SHA1

    d1678ca572eebed0cd392ff1cd0cccacdce2067d

  • SHA256

    0b56823bf4d3e3b17518c147ad4d520d34b2c648111730cd83f123948d8f0ab4

  • SHA512

    e2260ae32d333c898fd3dfbb32d2f5dda0ab390258fe813fc24f00b4ce09554644632ea653f78b59ba35b96f9e8c4c60de9fa0ae64f1cc5b8ac7df2bbc5ee793

  • SSDEEP

    98304:dqjNw+IVoIjhBx2oyyl210HL3MMOT0Rsoo82Pb0VKq0:ETIVoIjhBg10HTMD5MVK3

Score
10/10

Malware Config

Extracted

Family

lumma

C2

82.118.23.50

Targets

    • Target

      tmp

    • Size

      6.4MB

    • MD5

      4e86343c81e09b6079449183a5289d08

    • SHA1

      d1678ca572eebed0cd392ff1cd0cccacdce2067d

    • SHA256

      0b56823bf4d3e3b17518c147ad4d520d34b2c648111730cd83f123948d8f0ab4

    • SHA512

      e2260ae32d333c898fd3dfbb32d2f5dda0ab390258fe813fc24f00b4ce09554644632ea653f78b59ba35b96f9e8c4c60de9fa0ae64f1cc5b8ac7df2bbc5ee793

    • SSDEEP

      98304:dqjNw+IVoIjhBx2oyyl210HL3MMOT0Rsoo82Pb0VKq0:ETIVoIjhBg10HTMD5MVK3

    Score
    10/10
    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks