General

  • Target

    7f4bb44f712ac04f652b332ea1435e6f8eaa6053fd61e96f2ba6cfd0d11fd1b8

  • Size

    13.4MB

  • Sample

    241126-ypfbvaxjdy

  • MD5

    29389bd6bd907ba09de3c13227bf2d69

  • SHA1

    1b93a15d8f48774bd7fdd01f627cfddc087a8716

  • SHA256

    7f4bb44f712ac04f652b332ea1435e6f8eaa6053fd61e96f2ba6cfd0d11fd1b8

  • SHA512

    07eed5fef133328029894d2cc174a788566ab154648414fa2e86026ca3d885607d112dbd3916f683db99b3893e2f45390d666beaa7c297bfc5be32846592554a

  • SSDEEP

    196608:yj+Vl1m/bFivLBTe5xKqn8elgXHa9S08b8gWvTKlKGSPOli/+eqC+wYA:yj+E/0vL7W+HaY08AgWvMKGlLw+wYA

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://powerful-avoids.sbs

https://motion-treesz.sbs

https://disobey-curly.sbs

https://leg-sate-boat.sbs

https://story-tense-faz.sbs

https://blade-govern.sbs

https://occupy-blushi.sbs

https://frogs-severz.sbs

https://property-imper.sbs

Extracted

Family

lumma

C2

https://blade-govern.sbs/api

https://story-tense-faz.sbs/api

https://disobey-curly.sbs/api

https://motion-treesz.sbs/api

https://powerful-avoids.sbs/api

Targets

    • Target

      7f4bb44f712ac04f652b332ea1435e6f8eaa6053fd61e96f2ba6cfd0d11fd1b8

    • Size

      13.4MB

    • MD5

      29389bd6bd907ba09de3c13227bf2d69

    • SHA1

      1b93a15d8f48774bd7fdd01f627cfddc087a8716

    • SHA256

      7f4bb44f712ac04f652b332ea1435e6f8eaa6053fd61e96f2ba6cfd0d11fd1b8

    • SHA512

      07eed5fef133328029894d2cc174a788566ab154648414fa2e86026ca3d885607d112dbd3916f683db99b3893e2f45390d666beaa7c297bfc5be32846592554a

    • SSDEEP

      196608:yj+Vl1m/bFivLBTe5xKqn8elgXHa9S08b8gWvTKlKGSPOli/+eqC+wYA:yj+E/0vL7W+HaY08AgWvMKGlLw+wYA

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks