General

  • Target

    https://bnju6yh.pro/?jxKhBafDElNv4V2mXWPzRC0iAbnO3Zw7SoekQs5rtGgcYu6qU9JyTI1p8LdF-OiqEkWRQBlmN0GZ1CnyIwze8MH4cpJPvtA-rIq0PNWkQBzvm3YT7DLSxyFu6JwKMcpn842XlOjaZgf51otbU9HEiVeGsCR

  • Sample

    240229-mbhdhaed46

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://forknegotationaow.shop/api

https://technologyenterdo.shop/api

https://detectordiscusser.shop/api

https://turkeyunlikelyofw.shop/api

https://associationokeo.shop/api

Targets

    • Target

      https://bnju6yh.pro/?jxKhBafDElNv4V2mXWPzRC0iAbnO3Zw7SoekQs5rtGgcYu6qU9JyTI1p8LdF-OiqEkWRQBlmN0GZ1CnyIwze8MH4cpJPvtA-rIq0PNWkQBzvm3YT7DLSxyFu6JwKMcpn842XlOjaZgf51otbU9HEiVeGsCR

    Score
    10/10
    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks