General

  • Target

    YzE0OTBhZjk1ZmFmMjVhYmE0MzQwZWVmYmZkOGE2YjE.exe

  • Size

    4.1MB

  • Sample

    240226-qcjvhaef7y

  • MD5

    615e5f53a8973eff983aafdc746c5a07

  • SHA1

    927123a837a4110263320384c8a109b3c036c6cb

  • SHA256

    f785ca153f791e5996494ebf3c224e84f425e9a7338f08949ebe7edb2c99d7d7

  • SHA512

    24ad4219f195df9138d4a20baee4cc24f12cfe9f9a1ceb2cf375ded7a564090db9c87d82c3a851864226ce44906a32831c5e68298de01230c215193cd5519052

  • SSDEEP

    98304:szYVHLHegg3VTL4kOIlBsc4YY6IqKSc5J5yxA3bCrB:YYxHkL4UXsc4v+KSc5JkxGbCrB

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://turkeyunlikelyofw.shop/api

https://associationokeo.shop/api

Targets

    • Target

      YzE0OTBhZjk1ZmFmMjVhYmE0MzQwZWVmYmZkOGE2YjE.exe

    • Size

      4.1MB

    • MD5

      615e5f53a8973eff983aafdc746c5a07

    • SHA1

      927123a837a4110263320384c8a109b3c036c6cb

    • SHA256

      f785ca153f791e5996494ebf3c224e84f425e9a7338f08949ebe7edb2c99d7d7

    • SHA512

      24ad4219f195df9138d4a20baee4cc24f12cfe9f9a1ceb2cf375ded7a564090db9c87d82c3a851864226ce44906a32831c5e68298de01230c215193cd5519052

    • SSDEEP

      98304:szYVHLHegg3VTL4kOIlBsc4YY6IqKSc5J5yxA3bCrB:YYxHkL4UXsc4v+KSc5JkxGbCrB

    Score
    10/10
    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks