General

  • Target

    b484b5356d00aef00d35c1339aa0c8937f2725cdccc06156d1941ca6bf63efb5.zip

  • Size

    240KB

  • Sample

    240402-mqrwgsfh74

  • MD5

    be5b65dcfddbfcc00c30976f9c4a4093

  • SHA1

    06e08c627c1f4f66e6ace21ee3ba2ead40deb5a8

  • SHA256

    dca207d0e34dbc81abc8553800807adb228043ec384b0ec3d33abfcc7deae3fe

  • SHA512

    2ecaf68aa7171a6b536b00ca04835f004acbd7f2154f63bd623c2bfe8bfbd2551cc2765cf1fca5b882dbb832cf14a0a8ed858e3a1a8931fd92fa31745815f722

  • SSDEEP

    6144:y72ch7wUVIPCjbudkysWBmhT/E7/9xL5WNKFDiQArmJ8V:VUiCn85mdM7FxLUNKkQomu

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://paintercrutcheniw.shop/api

Targets

    • Target

      b484b5356d00aef00d35c1339aa0c8937f2725cdccc06156d1941ca6bf63efb5.exe

    • Size

      372KB

    • MD5

      ee00befc0e8ddba06dfa8510902aff79

    • SHA1

      7af7a60d99c8cea7c9d64e87ef2a4bfa56199328

    • SHA256

      b484b5356d00aef00d35c1339aa0c8937f2725cdccc06156d1941ca6bf63efb5

    • SHA512

      a063c2b216955531a8661436eb8ffcbf0f43870e459f942f629e7586ff725adcb4b7da36063412716e961c88025a16aa30450adad86045202280065c99632b81

    • SSDEEP

      3072:SA3jy8PU2hlpXQ+nIdw4ziY0T+0oU/xil8NLuimFRTxgZX+jJGDCzA4O6VG5Du9S:zmMAs+WiPzT6V7DN1HuU319Xi

    Score
    10/10
    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Collection

Data from Local System

2
T1005

Tasks