General

  • Target

    scr1ipt.ps1

  • Size

    7KB

  • Sample

    240614-qwaqyasfqe

  • MD5

    c44d7216c3cc62db69cbe60ac2e67a1c

  • SHA1

    3a7aedb6c1f4d072c4656dbd49317fe5b38dcc12

  • SHA256

    db1b59a6777f2d0e813317be50541ff20b72dd82711feb6f73c875e58a37343b

  • SHA512

    892cc044bab84a48a953f8a46a55247c12bfb3b34774e106ae4632b3bc7e6f63ec88299c3a685d46c64f49c497a261057acc4184bf3a4d9487fd0e7d2817456d

  • SSDEEP

    192:7qFeaF0diqqeaYzkIJm/5Z0dK7ZhWz7Xhbi9pdM3:79QV83YIcRZ3ZhSGQ

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://bsc-dataseed1.binance.org/

Extracted

Family

lumma

C2

https://secretiveonnicuw.shop/api

https://liabiliytshareodlkv.shop/api

https://notoriousdcellkw.shop/api

https://conferencefreckewl.shop/api

https://flourhishdiscovrw.shop/api

https://landdumpycolorwskfw.shop/api

https://ohfantasyproclaiwlo.shop/api

https://parallelmercywksoffw.shop/api

https://barebrilliancedkoso.shop/api

Targets

    • Target

      scr1ipt.ps1

    • Size

      7KB

    • MD5

      c44d7216c3cc62db69cbe60ac2e67a1c

    • SHA1

      3a7aedb6c1f4d072c4656dbd49317fe5b38dcc12

    • SHA256

      db1b59a6777f2d0e813317be50541ff20b72dd82711feb6f73c875e58a37343b

    • SHA512

      892cc044bab84a48a953f8a46a55247c12bfb3b34774e106ae4632b3bc7e6f63ec88299c3a685d46c64f49c497a261057acc4184bf3a4d9487fd0e7d2817456d

    • SSDEEP

      192:7qFeaF0diqqeaYzkIJm/5Z0dK7ZhWz7Xhbi9pdM3:79QV83YIcRZ3ZhSGQ

    Score
    10/10
    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks