General

  • Target

    https://mega.nz/file/531lnLZb#dLmxoLZ1aHvB6kjdkogYKxBwUM9h19zG0PVuPGS7VYI

  • Sample

    240803-jpan2a1gqe

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://boillingyskop.shop/api

https://empiredzmwnx.shop/api

https://boattyownerwrv.shop/api

https://rainbowmynsjn.shop/api

https://definitonizmnx.shop/api

https://creepydxzoxmj.shop/api

https://budgetttysnzm.shop/api

https://chippyfroggsyhz.shop/api

https://assumedtribsosp.shop/api

Extracted

Family

lumma

C2

https://boillingyskop.shop/api

https://empiredzmwnx.shop/api

https://boattyownerwrv.shop/api

https://rainbowmynsjn.shop/api

https://definitonizmnx.shop/api

https://creepydxzoxmj.shop/api

https://budgetttysnzm.shop/api

https://chippyfroggsyhz.shop/api

https://assumedtribsosp.shop/api

https://tenntysjuxmz.shop/api

Targets

    • Target

      https://mega.nz/file/531lnLZb#dLmxoLZ1aHvB6kjdkogYKxBwUM9h19zG0PVuPGS7VYI

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks