General

  • Target

    Novo Documento de Texto.txt

  • Size

    134B

  • Sample

    241120-v3qg7azpcz

  • MD5

    2391e0b72978f242cb09495b35881f00

  • SHA1

    7bcc5f680f1014d7763fe105a26e22a3a94b5e52

  • SHA256

    4437acbb249285c3517c31914bb1d56c413550b616adc8331f93e6b8d28dd14e

  • SHA512

    19c209e5255757e8d8f7887bc6e0c4272d72c0caad3542cf2f6fcdee737b8416d3c1204ab871cf04e7f2994964e32f1c571ab603c4f5370e99d05bbf1276a2d7

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://h011daycrafter.cyou/api

Targets

    • Target

      Novo Documento de Texto.txt

    • Size

      134B

    • MD5

      2391e0b72978f242cb09495b35881f00

    • SHA1

      7bcc5f680f1014d7763fe105a26e22a3a94b5e52

    • SHA256

      4437acbb249285c3517c31914bb1d56c413550b616adc8331f93e6b8d28dd14e

    • SHA512

      19c209e5255757e8d8f7887bc6e0c4272d72c0caad3542cf2f6fcdee737b8416d3c1204ab871cf04e7f2994964e32f1c571ab603c4f5370e99d05bbf1276a2d7

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks