General

  • Target

    cc0a944cca54e0bd77b39fa9b1724ee93876b8b3aff51763e4038dd2bc4a7cf8N.exe

  • Size

    474KB

  • Sample

    241127-chssps1mdt

  • MD5

    2322b0bf9eb128840491695ad8733b40

  • SHA1

    4db99129d59ba69a5206ce1713465cdd4d00f219

  • SHA256

    cc0a944cca54e0bd77b39fa9b1724ee93876b8b3aff51763e4038dd2bc4a7cf8

  • SHA512

    ee3230c2ca36d865927f7dc5e5c460d6552ca76261a9c7dd4ef0ab4d855b7a391aa78cb079c5bad09020b144943e7c3eb0cfd66bd55ee14751bb0c575dc746fc

  • SSDEEP

    12288:eJB+nneDgkXFEIkwKKA4VmvJnUdyL1q3LDQ1eBCG:CAoR28AgQGdyhq33eeBCG

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://powerful-avoids.sbs

https://motion-treesz.sbs

https://disobey-curly.sbs

https://leg-sate-boat.sbs

https://story-tense-faz.sbs

https://blade-govern.sbs

https://occupy-blushi.sbs

https://frogs-severz.sbs

Extracted

Family

lumma

C2

https://blade-govern.sbs/api

https://story-tense-faz.sbs/api

Targets

    • Target

      cc0a944cca54e0bd77b39fa9b1724ee93876b8b3aff51763e4038dd2bc4a7cf8N.exe

    • Size

      474KB

    • MD5

      2322b0bf9eb128840491695ad8733b40

    • SHA1

      4db99129d59ba69a5206ce1713465cdd4d00f219

    • SHA256

      cc0a944cca54e0bd77b39fa9b1724ee93876b8b3aff51763e4038dd2bc4a7cf8

    • SHA512

      ee3230c2ca36d865927f7dc5e5c460d6552ca76261a9c7dd4ef0ab4d855b7a391aa78cb079c5bad09020b144943e7c3eb0cfd66bd55ee14751bb0c575dc746fc

    • SSDEEP

      12288:eJB+nneDgkXFEIkwKKA4VmvJnUdyL1q3LDQ1eBCG:CAoR28AgQGdyhq33eeBCG

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks