General

  • Target

    e5693e87e9b7e438f4246f80f13d0f5e.bin

  • Size

    3.9MB

  • Sample

    240326-e9eq9sfh3s

  • MD5

    e5693e87e9b7e438f4246f80f13d0f5e

  • SHA1

    bfa226389fbeed4172d6c06dd9e5865c085945f0

  • SHA256

    b9af457abc6a1ba8abf2b857847578b888964dfa671599985fe7649695a6cb60

  • SHA512

    7cb5765cf7c60b9ab4ec96f600572ace3f93ba98cb899a05ad8d0ee7c62cba6c97f7308be4a7ea70bdc72225b127e2b67ae7b52b1fd53f3c33bb999670ad50d0

  • SSDEEP

    98304:WbzczBM9Czp5+Yq501qQQS4pJ+02Ww/GJcBYX8QbvxLptP6FbKEqT:Wb4zjzKY/F4pJ2KJcBYsmxL76FbKEqT

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://sailsystemeyeusjw.shop/api

https://associationokeo.shop/api

Targets

    • Target

      e5693e87e9b7e438f4246f80f13d0f5e.bin

    • Size

      3.9MB

    • MD5

      e5693e87e9b7e438f4246f80f13d0f5e

    • SHA1

      bfa226389fbeed4172d6c06dd9e5865c085945f0

    • SHA256

      b9af457abc6a1ba8abf2b857847578b888964dfa671599985fe7649695a6cb60

    • SHA512

      7cb5765cf7c60b9ab4ec96f600572ace3f93ba98cb899a05ad8d0ee7c62cba6c97f7308be4a7ea70bdc72225b127e2b67ae7b52b1fd53f3c33bb999670ad50d0

    • SSDEEP

      98304:WbzczBM9Czp5+Yq501qQQS4pJ+02Ww/GJcBYX8QbvxLptP6FbKEqT:Wb4zjzKY/F4pJ2KJcBYsmxL76FbKEqT

    Score
    10/10
    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks