General

  • Target

    Setup_x32_x64.exe

  • Size

    624KB

  • Sample

    240213-sejzdscc6z

  • MD5

    6386053e57e29d41685877f40523582b

  • SHA1

    e6db1e1a1207c440757148b72784ea1ab2eb05fc

  • SHA256

    7309e949f3bd56d68f51def22466f9fcad456fd22ed61b1303e3cca872352540

  • SHA512

    96ee9df9d457644a698b5f1fc5a511a740734dd3df5181b76d047cb27c7a0f3fa0e035773c1385b707cbb6989f9794b7ac5c1fd33077fdc72fa1acd5054004bb

  • SSDEEP

    12288:Eh1Fk70TnvjcermbGoEUSOcv+bRilH65ylDjJO0jF8bDeoRsoGAsOUNq58:qk70TrcegGMSOdilVlZ8bD5lG9OUQ58

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://theoryapparatusjuko.fun/api

https://snuggleapplicationswo.fun/api

https://smallrabbitcrossing.site/api

https://telephoneverdictyow.site/api

Targets

    • Target

      Setup_x32_x64.exe

    • Size

      624KB

    • MD5

      6386053e57e29d41685877f40523582b

    • SHA1

      e6db1e1a1207c440757148b72784ea1ab2eb05fc

    • SHA256

      7309e949f3bd56d68f51def22466f9fcad456fd22ed61b1303e3cca872352540

    • SHA512

      96ee9df9d457644a698b5f1fc5a511a740734dd3df5181b76d047cb27c7a0f3fa0e035773c1385b707cbb6989f9794b7ac5c1fd33077fdc72fa1acd5054004bb

    • SSDEEP

      12288:Eh1Fk70TnvjcermbGoEUSOcv+bRilH65ylDjJO0jF8bDeoRsoGAsOUNq58:qk70TrcegGMSOdilVlZ8bD5lG9OUQ58

    Score
    10/10
    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks