General

  • Target

    3f843f9cf9346c56f29bceee03b9512d84a92bd94b7b6f4ee668bc4a6e3f8047.exe

  • Size

    319KB

  • Sample

    240330-cj4llafe67

  • MD5

    30732747ca33bd37a757c90aada0c604

  • SHA1

    b175606037f75bc349b5221aa999334d961c471b

  • SHA256

    3f843f9cf9346c56f29bceee03b9512d84a92bd94b7b6f4ee668bc4a6e3f8047

  • SHA512

    a672d0d573a3cb2fcb06db975ae3d34ae820f7c14c8e6ce24a1d63da511ff7bb3aaeb331026441729e3def6a9625e444b36e6b2a7d76072ebf08a6e5416980a1

  • SSDEEP

    6144:DuTgT9kw0NZk9gAGkgAcYjd56miof1AjoM0kkrBS9F:JTKw4ZWg6cYjd55ih8RkkrAF

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://wagonglidemonkywo.shop/api

Targets

    • Target

      3f843f9cf9346c56f29bceee03b9512d84a92bd94b7b6f4ee668bc4a6e3f8047.exe

    • Size

      319KB

    • MD5

      30732747ca33bd37a757c90aada0c604

    • SHA1

      b175606037f75bc349b5221aa999334d961c471b

    • SHA256

      3f843f9cf9346c56f29bceee03b9512d84a92bd94b7b6f4ee668bc4a6e3f8047

    • SHA512

      a672d0d573a3cb2fcb06db975ae3d34ae820f7c14c8e6ce24a1d63da511ff7bb3aaeb331026441729e3def6a9625e444b36e6b2a7d76072ebf08a6e5416980a1

    • SSDEEP

      6144:DuTgT9kw0NZk9gAGkgAcYjd56miof1AjoM0kkrBS9F:JTKw4ZWg6cYjd55ih8RkkrAF

    Score
    10/10
    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

MITRE ATT&CK Enterprise v15

Tasks