General

  • Target

    f91e26ad117d187f3fc7bc2aeadb9c4d.bin

  • Size

    3.8MB

  • Sample

    240227-ekgvbsfg34

  • MD5

    3034f348cddd8165ab6efa68e6f891a8

  • SHA1

    45c0550dcc6bd99c8e3f2abbc88b8de6c723f175

  • SHA256

    177a2c7fd93f43203d8f0d1af204442c0a673bb632440bede23d3adddcb20ed9

  • SHA512

    9aad85432bc61eeacebf60fa844d5810e51a33142ebfc1bad983138bf69bd9999d2a7d88ef8b349c007e0c962701fc853550303a850fba2dd19829fa358e919c

  • SSDEEP

    98304:OpQvoyD4k8KX7DmKDZpE47RwcOqTD6ycG5MN5/xc:3//tiwvB6yRoxc

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://fieldtrollyeowskwe.shop/api

https://technologyenterdo.shop/api

https://detectordiscusser.shop/api

https://turkeyunlikelyofw.shop/api

https://associationokeo.shop/api

Targets

    • Target

      fb649af245b195baa02a4790f237b4c7dad4d9a116ab10ec5fdb9be45dbd628a.exe

    • Size

      7.0MB

    • MD5

      f91e26ad117d187f3fc7bc2aeadb9c4d

    • SHA1

      6cb277d592ee18700a0386e183a96535c9fa7c5a

    • SHA256

      fb649af245b195baa02a4790f237b4c7dad4d9a116ab10ec5fdb9be45dbd628a

    • SHA512

      30173320a736f385ed4c28cf33383487abd70d8c369dfd39863331b40b02c6f8b71eec6096ab77b61f0df9819e834900c73409f7bc03981f4bb86ffb1cb74814

    • SSDEEP

      49152:EbV/PT3YubG0iYsV5TK7n46OeBIl0WS2q0GMQRZn1JUOKInVh+fg63+NSQbUFkDg:EbV/PT3luw5OeBAS2q0O1TubOSQbNjI

    Score
    10/10
    • Detect ZGRat V1

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks