General

  • Target

    67ece3106f3e07ae7756b8e88e20b9ff59a5fc4ef253b07cd215085ff3adab82.exe

  • Size

    521KB

  • Sample

    240710-vs2gpssdjb

  • MD5

    0e6f574883cf8d2d46a73a4ef0c2a1d5

  • SHA1

    5825b85987a409471446c878eec16804bd23c100

  • SHA256

    67ece3106f3e07ae7756b8e88e20b9ff59a5fc4ef253b07cd215085ff3adab82

  • SHA512

    63044deac29e596b0226997f01d42ba1132ae3260883932521b0e72b04e2ec7a7bde4e6381b20c1e81846d52121d10e3e94b7b3d8c22f81520625be1c0cf999b

  • SSDEEP

    12288:k07v1x51ZVq4WrCvkMjCDcrYaPftabsCgtsJRG0Mx:k07Nx51bNGC4DI1P4otsJfM

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://piedsiggnycliquieaw.shop/api

https://bouncedgowp.shop/api

https://bannngwko.shop/api

https://bargainnykwo.shop/api

https://affecthorsedpo.shop/api

https://radiationnopp.shop/api

https://answerrsdo.shop/api

https://publicitttyps.shop/api

https://benchillppwo.shop/api

https://reinforcedirectorywd.shop/api

Targets

    • Target

      67ece3106f3e07ae7756b8e88e20b9ff59a5fc4ef253b07cd215085ff3adab82.exe

    • Size

      521KB

    • MD5

      0e6f574883cf8d2d46a73a4ef0c2a1d5

    • SHA1

      5825b85987a409471446c878eec16804bd23c100

    • SHA256

      67ece3106f3e07ae7756b8e88e20b9ff59a5fc4ef253b07cd215085ff3adab82

    • SHA512

      63044deac29e596b0226997f01d42ba1132ae3260883932521b0e72b04e2ec7a7bde4e6381b20c1e81846d52121d10e3e94b7b3d8c22f81520625be1c0cf999b

    • SSDEEP

      12288:k07v1x51ZVq4WrCvkMjCDcrYaPftabsCgtsJRG0Mx:k07Nx51bNGC4DI1P4otsJfM

    Score
    10/10
    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks