General

  • Target

    15f779bef759b5566c409ab78d4fe244dc224c669cf3f67b0b93f89520261ae7.exe

  • Size

    12.5MB

  • Sample

    240706-bek31s1cpk

  • MD5

    0b7e6ef92b0cfa06d61ba19b250c3c7f

  • SHA1

    1bfe28646c8b4e20e94926ea1987d64228095bfe

  • SHA256

    15f779bef759b5566c409ab78d4fe244dc224c669cf3f67b0b93f89520261ae7

  • SHA512

    2711d92c167ebbb060b2025062018ec67e4f39ed7783722b84ed145e32b7c1673341f993405070dea55ead256d38d6d97512d6087cb5685358f33fab4c906d2f

  • SSDEEP

    49152:FLfQjGFDZLiY0JXPGgqbw++DwCJXfbS8nfoD3GZvv5dQux6hICgG7vAY6xEasrEW:DLuXO1+iGZvtzpspES6EIA4anfL

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://bannngwko.shop/api

Targets

    • Target

      15f779bef759b5566c409ab78d4fe244dc224c669cf3f67b0b93f89520261ae7.exe

    • Size

      12.5MB

    • MD5

      0b7e6ef92b0cfa06d61ba19b250c3c7f

    • SHA1

      1bfe28646c8b4e20e94926ea1987d64228095bfe

    • SHA256

      15f779bef759b5566c409ab78d4fe244dc224c669cf3f67b0b93f89520261ae7

    • SHA512

      2711d92c167ebbb060b2025062018ec67e4f39ed7783722b84ed145e32b7c1673341f993405070dea55ead256d38d6d97512d6087cb5685358f33fab4c906d2f

    • SSDEEP

      49152:FLfQjGFDZLiY0JXPGgqbw++DwCJXfbS8nfoD3GZvv5dQux6hICgG7vAY6xEasrEW:DLuXO1+iGZvtzpspES6EIA4anfL

    Score
    10/10
    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks