General

  • Target

    5ad23ec8c9faf2d7ffa0dc563abef6afff05e61c4eaab3e21b9cd6785dbc5049N

  • Size

    1.0MB

  • Sample

    241009-wc44bszgqq

  • MD5

    01c9a72a71aa4bca781de7a0b2090940

  • SHA1

    c090c36fd3d718a6b56efce86e172bc2e99d9b6b

  • SHA256

    5ad23ec8c9faf2d7ffa0dc563abef6afff05e61c4eaab3e21b9cd6785dbc5049

  • SHA512

    23be2ade23c4c53c619aaaa62e549a9e407b32e553071bac6b9937752cdc77bd06fd39248511e554d955255758e1d323412a7b82f76e15829a1a5c754609d5d1

  • SSDEEP

    24576:lFSq+qYc26nMOXoptIbWJwNfV+IvkFN7xf57YaYTEje:nYh6bYpKaJw5VGFx7Ya/je

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://delaylacedmn.site

https://writekdmsnu.site

https://agentyanlark.site

https://bellykmrebk.site

https://underlinemdsj.site

https://commandejorsk.site

https://possiwreeste.site

https://famikyjdiag.site

Targets

    • Target

      5ad23ec8c9faf2d7ffa0dc563abef6afff05e61c4eaab3e21b9cd6785dbc5049N

    • Size

      1.0MB

    • MD5

      01c9a72a71aa4bca781de7a0b2090940

    • SHA1

      c090c36fd3d718a6b56efce86e172bc2e99d9b6b

    • SHA256

      5ad23ec8c9faf2d7ffa0dc563abef6afff05e61c4eaab3e21b9cd6785dbc5049

    • SHA512

      23be2ade23c4c53c619aaaa62e549a9e407b32e553071bac6b9937752cdc77bd06fd39248511e554d955255758e1d323412a7b82f76e15829a1a5c754609d5d1

    • SSDEEP

      24576:lFSq+qYc26nMOXoptIbWJwNfV+IvkFN7xf57YaYTEje:nYh6bYpKaJw5VGFx7Ya/je

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks