General

  • Target

    65bbc0c3472230c4f809b4226a5e1bef04ea6fbdf39ed1f24168642e5fe0989a

  • Size

    398KB

  • Sample

    240404-w5nxtaeg6x

  • MD5

    0872cbd22655e0ca0b28dd00dca1a2b9

  • SHA1

    5a291141a2145c4abe75ba499328e9282930303d

  • SHA256

    65bbc0c3472230c4f809b4226a5e1bef04ea6fbdf39ed1f24168642e5fe0989a

  • SHA512

    60c8a247faee159c3e95dc04e0c10083a8c96ccbe8b78cf8ffe052593fd354bf796ec206dec1da5eb4cba759b7953dc367d0516e68b27a9dfa6a9873cdde37c3

  • SSDEEP

    6144:nF8s2+i3GkvC7oYaRgxwt0OL5FEJtadwIXDqdHPY8X:+sni3XaEL3EDnCmO8

Malware Config

Extracted

Family

lumma

C2

https://appliedgrandyjuiw.shop/api

Targets

    • Target

      65bbc0c3472230c4f809b4226a5e1bef04ea6fbdf39ed1f24168642e5fe0989a

    • Size

      398KB

    • MD5

      0872cbd22655e0ca0b28dd00dca1a2b9

    • SHA1

      5a291141a2145c4abe75ba499328e9282930303d

    • SHA256

      65bbc0c3472230c4f809b4226a5e1bef04ea6fbdf39ed1f24168642e5fe0989a

    • SHA512

      60c8a247faee159c3e95dc04e0c10083a8c96ccbe8b78cf8ffe052593fd354bf796ec206dec1da5eb4cba759b7953dc367d0516e68b27a9dfa6a9873cdde37c3

    • SSDEEP

      6144:nF8s2+i3GkvC7oYaRgxwt0OL5FEJtadwIXDqdHPY8X:+sni3XaEL3EDnCmO8

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks