General

  • Target

    XZ0MQ_247988bfb34200256afe8f34ebd633e5a2a16c1c8b83313ad06f79641aad8a6b

  • Size

    1.5MB

  • Sample

    241118-vt2h4awmgr

  • MD5

    3f939ebfd944b6994be38c5894c27cd0

  • SHA1

    b824b05be12efe6c62f7efff19a296b2ea9c468a

  • SHA256

    247988bfb34200256afe8f34ebd633e5a2a16c1c8b83313ad06f79641aad8a6b

  • SHA512

    16e2db263d19df4f060137de6208ffd2710b8bb846d13e6f794f0f2614b6110a1c158e99cfef630984085b47f01ddfead13521d9e11bbbd8028d05348e91cf34

  • SSDEEP

    24576:b1V5bEb5v837jDHNCFYC/kNMqc5wwcotkPh2sQnBfGH9KI4hOugdO:BfxCFNGMql5PnQNG+ks

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://processhol.sbs/api

https://p10tgrace.sbs/api

https://peepburry828.sbs/api

https://3xp3cts1aim.sbs/api

https://p3ar11fter.sbs/api

Targets

    • Target

      XZ0MQ_247988bfb34200256afe8f34ebd633e5a2a16c1c8b83313ad06f79641aad8a6b

    • Size

      1.5MB

    • MD5

      3f939ebfd944b6994be38c5894c27cd0

    • SHA1

      b824b05be12efe6c62f7efff19a296b2ea9c468a

    • SHA256

      247988bfb34200256afe8f34ebd633e5a2a16c1c8b83313ad06f79641aad8a6b

    • SHA512

      16e2db263d19df4f060137de6208ffd2710b8bb846d13e6f794f0f2614b6110a1c158e99cfef630984085b47f01ddfead13521d9e11bbbd8028d05348e91cf34

    • SSDEEP

      24576:b1V5bEb5v837jDHNCFYC/kNMqc5wwcotkPh2sQnBfGH9KI4hOugdO:BfxCFNGMql5PnQNG+ks

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks