General

  • Target

    007c6dfe4466894d678c06e6b30df77225450225ddd8e904e731cab32e82c512.exe

  • Size

    1.3MB

  • Sample

    240817-j5w7zayfmp

  • MD5

    31f04226973fdade2e7232918f11e5da

  • SHA1

    ff19422e7095cb81c10f6e067d483429e25937df

  • SHA256

    007c6dfe4466894d678c06e6b30df77225450225ddd8e904e731cab32e82c512

  • SHA512

    42198fc375993a09da3c8a2766ee6831cf52ff8cd60b3eb4256a361afa6963f64a0aff49adb87c3b22950e03c8ef58a94655959771f8d2d5b754012706220f66

  • SSDEEP

    24576:VzZDpgqx9+kamgRQ+uYU8hwjxKmAERKk1LxkGTagw276kyJsAb3WIWI:VrBxbEQ+uYJqQERKk9mE/76KAbr

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://complaintsipzzx.shop/api

https://writerospzm.shop/api

https://deallerospfosu.shop/api

https://bassizcellskz.shop/api

https://languagedscie.shop/api

https://quialitsuzoxm.shop/api

https://tenntysjuxmz.shop/api

Targets

    • Target

      007c6dfe4466894d678c06e6b30df77225450225ddd8e904e731cab32e82c512.exe

    • Size

      1.3MB

    • MD5

      31f04226973fdade2e7232918f11e5da

    • SHA1

      ff19422e7095cb81c10f6e067d483429e25937df

    • SHA256

      007c6dfe4466894d678c06e6b30df77225450225ddd8e904e731cab32e82c512

    • SHA512

      42198fc375993a09da3c8a2766ee6831cf52ff8cd60b3eb4256a361afa6963f64a0aff49adb87c3b22950e03c8ef58a94655959771f8d2d5b754012706220f66

    • SSDEEP

      24576:VzZDpgqx9+kamgRQ+uYU8hwjxKmAERKk1LxkGTagw276kyJsAb3WIWI:VrBxbEQ+uYJqQERKk9mE/76KAbr

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks