General

  • Target

    4aa99f1c47ad22b11e35eea66c06493db9e27602a471d83636a78e09efd7a1caN.exe

  • Size

    484KB

  • Sample

    241126-zc8y3aylev

  • MD5

    06c6ff27302d34a9eebc8b18f324f280

  • SHA1

    e672c366a8ae2c22682eef480c751ff4a243a978

  • SHA256

    4aa99f1c47ad22b11e35eea66c06493db9e27602a471d83636a78e09efd7a1ca

  • SHA512

    540655c6dc9003e0071c6ba8164634a47f18d685cb7bc2ab89f34d6160cc4b663d1bad8c47b257a7d80bbca39e6a809e9688cf8cb31c907305686d3f5474f014

  • SSDEEP

    12288:SJB+nneDgkXFEIs2Gvih6W8Rd70dDufr1/:2AoR24BhL4r1/

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://powerful-avoids.sbs

https://motion-treesz.sbs

https://disobey-curly.sbs

https://leg-sate-boat.sbs

https://story-tense-faz.sbs

https://blade-govern.sbs

https://occupy-blushi.sbs

https://frogs-severz.sbs

Extracted

Family

lumma

C2

https://blade-govern.sbs/api

https://disobey-curly.sbs/api

https://motion-treesz.sbs/api

https://powerful-avoids.sbs/api

https://story-tense-faz.sbs/api

Targets

    • Target

      4aa99f1c47ad22b11e35eea66c06493db9e27602a471d83636a78e09efd7a1caN.exe

    • Size

      484KB

    • MD5

      06c6ff27302d34a9eebc8b18f324f280

    • SHA1

      e672c366a8ae2c22682eef480c751ff4a243a978

    • SHA256

      4aa99f1c47ad22b11e35eea66c06493db9e27602a471d83636a78e09efd7a1ca

    • SHA512

      540655c6dc9003e0071c6ba8164634a47f18d685cb7bc2ab89f34d6160cc4b663d1bad8c47b257a7d80bbca39e6a809e9688cf8cb31c907305686d3f5474f014

    • SSDEEP

      12288:SJB+nneDgkXFEIs2Gvih6W8Rd70dDufr1/:2AoR24BhL4r1/

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks