General

  • Target

    a2bf31a82eb44ca538b8a006aa11bbcef9257d0ca3385d954bb0945cd164e5de.zip

  • Size

    1.5MB

  • Sample

    241002-bwebsszgpq

  • MD5

    07f6a50912a0d9db332472b65f9f663a

  • SHA1

    a52fb64764d25c6c995547b21b1bbcb637500da3

  • SHA256

    a2bf31a82eb44ca538b8a006aa11bbcef9257d0ca3385d954bb0945cd164e5de

  • SHA512

    f1a57041724e39be5e9e0bd62610b50d6186d551bf9b148ddb5fb0b099a7f4aca00f8a88cd326d1f3fa33633bc9012b3e176ba99fa67d110f4d3f4750301b53c

  • SSDEEP

    49152:zW5f31QcT9bwVH1fsOk3Jb2qZsqWsBUKSRf:zWp3pbyfY3Jb2sUK4

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://trenndylicensei.shop/api

Extracted

Family

lumma

C2

https://trenndylicensei.shop/api

Targets

    • Target

      MpGear.dll

    • Size

      592KB

    • MD5

      7f4b739419014e7e1f5b8010d763774c

    • SHA1

      723480e1298ddb1e1f8a9211cb6f20e30b1290ea

    • SHA256

      9bf8610263ad11cc6f655b335ba8c80edab05614bfb2476c0ca435e951250d9a

    • SHA512

      ac97b53e60740a01bdb026f5f4836eb992be0159b3af815a1a8c900f091fed08d96ad28c27c81108bb0cc6e027102b074c012d638b6b94aead5a615f7450a473

    • SSDEEP

      12288:A5LcnKeIaZ+dwGbzSifdhvdE7sjXj8cjb+DYtxP:mLcLIaIxzSwDlfjXjBv8Y

    Score
    1/10
    • Target

      Setup.exe

    • Size

      1.6MB

    • MD5

      8f0717916432e1e4f3313c8ebde55210

    • SHA1

      41456cd9c3b66cfb22f9bbeefb6750cce516bf3a

    • SHA256

      8dc4d5deef19fb4da195c270819a6ee283b67408fc9ee187216a0ce80ee61bab

    • SHA512

      d1c4696541ec1d8d44e820902828bfbbd16afbb9c4a251080fc62262fbf879b268ed0fff80ea84aacdc58f424c516a979bb8fa82f0dfe920d71cad92f17bcfee

    • SSDEEP

      12288:N2EDigMo6E50Hmy00qEEmxnA7ECCXuiAK6xXHDJBIMQV2:bFaky0wEmxAQCCXuiA3XH8N2

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks