General

  • Target

    0a49a4d3b8a5fdfb2d925f6da4c0674ae527b2d51d828e50608cda2dc637bcc7.exe

  • Size

    519KB

  • Sample

    241015-be9flswapa

  • MD5

    b96c1cae8e90f64dd0941ee10b0db7ec

  • SHA1

    e03dfcd3c930f031ac83cb5aefb31c4c199dbd46

  • SHA256

    0a49a4d3b8a5fdfb2d925f6da4c0674ae527b2d51d828e50608cda2dc637bcc7

  • SHA512

    07d3819818b87c84f697c52df47fa932a4c5d77fac39ec38e2b73df839d904078ddbb78a03279856a8c0e588d252a598a8a4d070c6c8d44d2101f4b2fba9b72f

  • SSDEEP

    12288:OvZU3zYMYmKYfbT7jn0yaJDko2Dbl7B5xLhY5e74uEO:OBU3zSmK87jnla/KbFxLhY5UTt

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://drawwyobstacw.sbs

https://condifendteu.sbs

https://ehticsprocw.sbs

https://vennurviot.sbs

https://resinedyw.sbs

https://enlargkiw.sbs

https://allocatinow.sbs

https://mathcucom.sbs

https://unlikerwu.sbs

Targets

    • Target

      0a49a4d3b8a5fdfb2d925f6da4c0674ae527b2d51d828e50608cda2dc637bcc7.exe

    • Size

      519KB

    • MD5

      b96c1cae8e90f64dd0941ee10b0db7ec

    • SHA1

      e03dfcd3c930f031ac83cb5aefb31c4c199dbd46

    • SHA256

      0a49a4d3b8a5fdfb2d925f6da4c0674ae527b2d51d828e50608cda2dc637bcc7

    • SHA512

      07d3819818b87c84f697c52df47fa932a4c5d77fac39ec38e2b73df839d904078ddbb78a03279856a8c0e588d252a598a8a4d070c6c8d44d2101f4b2fba9b72f

    • SSDEEP

      12288:OvZU3zYMYmKYfbT7jn0yaJDko2Dbl7B5xLhY5e74uEO:OBU3zSmK87jnla/KbFxLhY5UTt

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks