General

  • Target

    ca514478a7516f7aff8343ca74c82bebc0480cbb590f27cb02ca559d2d4e8d90.exe

  • Size

    295KB

  • Sample

    240819-lxpt2a1bml

  • MD5

    bdc79de40c6138163814e9a0c2f46c8b

  • SHA1

    587b8c7705b01dc852a653ce5d19d8eda5e095b5

  • SHA256

    ca514478a7516f7aff8343ca74c82bebc0480cbb590f27cb02ca559d2d4e8d90

  • SHA512

    e8c49d1b0e7e915a13728356a1bd623c964cc39cf28e9f4daf83f354020fcfd2f94c31a6b45aa999b2ad2040f57471eb16bb6828ee9dd577b70859f06fae0efa

  • SSDEEP

    6144:+nHQiNdOF7f3N+SDXmQPCxqcDVGUK59FEkg:+HQvN+SCRqcxaEk

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://sensitivyitszv.shop/api

https://bouncedgowp.shop/api

https://bannngwko.shop/api

https://bargainnykwo.shop/api

https://affecthorsedpo.shop/api

https://radiationnopp.shop/api

https://answerrsdo.shop/api

https://publicitttyps.shop/api

https://benchillppwo.shop/api

Extracted

Family

lumma

C2

https://sensitivyitszv.shop/api

Targets

    • Target

      ca514478a7516f7aff8343ca74c82bebc0480cbb590f27cb02ca559d2d4e8d90.exe

    • Size

      295KB

    • MD5

      bdc79de40c6138163814e9a0c2f46c8b

    • SHA1

      587b8c7705b01dc852a653ce5d19d8eda5e095b5

    • SHA256

      ca514478a7516f7aff8343ca74c82bebc0480cbb590f27cb02ca559d2d4e8d90

    • SHA512

      e8c49d1b0e7e915a13728356a1bd623c964cc39cf28e9f4daf83f354020fcfd2f94c31a6b45aa999b2ad2040f57471eb16bb6828ee9dd577b70859f06fae0efa

    • SSDEEP

      6144:+nHQiNdOF7f3N+SDXmQPCxqcDVGUK59FEkg:+HQvN+SCRqcxaEk

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks