General

  • Target

    4e516af048f556de1ceaed29a0695586b0c7ecc310e509ac9a839f6b15b174a8.exe

  • Size

    309KB

  • Sample

    240229-f4dsfsfc54

  • MD5

    e6f0f795f293ee5eaf852ff638e62f7a

  • SHA1

    db4ee8e03a07a984a9cde535639993b2a9963479

  • SHA256

    4e516af048f556de1ceaed29a0695586b0c7ecc310e509ac9a839f6b15b174a8

  • SHA512

    c3e9ad56090c15faaa80074e85661065c31966ff312b89a690955a8b3bb6536eb92c6dee220f79972d66cca0d56aa3627335bcaa7e189d115eb298b448b1ac8c

  • SSDEEP

    6144:H4ML4uyHlh8ZDMs5jYOCbNWVxU7QfNwYDEu4gfBWpMNgiAV2WsMF0k919HD7oX5w:YMLYHrgDdjMgvUEfNwEX4gfBWxs20kdb

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://technologyenterdo.shop/api

https://detectordiscusser.shop/api

https://turkeyunlikelyofw.shop/api

https://associationokeo.shop/api

Targets

    • Target

      4e516af048f556de1ceaed29a0695586b0c7ecc310e509ac9a839f6b15b174a8.exe

    • Size

      309KB

    • MD5

      e6f0f795f293ee5eaf852ff638e62f7a

    • SHA1

      db4ee8e03a07a984a9cde535639993b2a9963479

    • SHA256

      4e516af048f556de1ceaed29a0695586b0c7ecc310e509ac9a839f6b15b174a8

    • SHA512

      c3e9ad56090c15faaa80074e85661065c31966ff312b89a690955a8b3bb6536eb92c6dee220f79972d66cca0d56aa3627335bcaa7e189d115eb298b448b1ac8c

    • SSDEEP

      6144:H4ML4uyHlh8ZDMs5jYOCbNWVxU7QfNwYDEu4gfBWpMNgiAV2WsMF0k919HD7oX5w:YMLYHrgDdjMgvUEfNwEX4gfBWxs20kdb

    Score
    10/10
    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks