General

  • Target

    word.zip

  • Size

    49.5MB

  • Sample

    240705-bkdacsyejl

  • MD5

    2065356a29de858b29e54be9111caa38

  • SHA1

    5c6416f041e2a2ed47056200d76a6f1f5eecebc6

  • SHA256

    db782aed8ef4fab6299d2d08ca2f695762535847a1e6e77b117fc2c7eb36da33

  • SHA512

    51333037e48943ca48fa7f73eb1949955901e672a478c60ee64e8dc674777ae9f15ef23e390a2b8aa0e3abc84ae67e08754894c07410c250a616a95119f2c502

  • SSDEEP

    1572864:1coUN9zmk+jAi/99i7wR4X/E6Fsv8THJtnUh:1cjg/ri44X/JFS8THJlUh

Malware Config

Targets

    • Target

      word.zip

    • Size

      49.5MB

    • MD5

      2065356a29de858b29e54be9111caa38

    • SHA1

      5c6416f041e2a2ed47056200d76a6f1f5eecebc6

    • SHA256

      db782aed8ef4fab6299d2d08ca2f695762535847a1e6e77b117fc2c7eb36da33

    • SHA512

      51333037e48943ca48fa7f73eb1949955901e672a478c60ee64e8dc674777ae9f15ef23e390a2b8aa0e3abc84ae67e08754894c07410c250a616a95119f2c502

    • SSDEEP

      1572864:1coUN9zmk+jAi/99i7wR4X/E6Fsv8THJtnUh:1cjg/ri44X/JFS8THJlUh

    • Detect Lumma Stealer payload V2

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers new Windows logon scripts automatically executed at logon.

MITRE ATT&CK Enterprise v15

Tasks