General

  • Target

    https://cdn.discordapp.com/attachments/1230856531810193408/1232808107566956574/OnlyFanLeaked_18.zip?ex=662acd85&is=66297c05&hm=26b52ce728716f1320804a51ed9aa19bea94f1b53eb5633ce0620db99ed5e31e&1

  • Sample

    240425-f3mnzagb3y

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://handbreeadretwaiw.shop/api

https://productivelookewr.shop/api

https://tolerateilusidjukl.shop/api

https://shatterbreathepsw.shop/api

https://shortsvelventysjo.shop/api

https://incredibleextedwj.shop/api

https://alcojoldwograpciw.shop/api

https://liabilitynighstjsko.shop/api

https://demonstationfukewko.shop/api

Targets

    • Target

      https://cdn.discordapp.com/attachments/1230856531810193408/1232808107566956574/OnlyFanLeaked_18.zip?ex=662acd85&is=66297c05&hm=26b52ce728716f1320804a51ed9aa19bea94f1b53eb5633ce0620db99ed5e31e&1

    Score
    10/10
    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks