General

  • Target

    548e70006e3ef7b8fc06ffa4b1e04fd4fc58bc5a40b8415f7befbce75b92fe9b.exe

  • Size

    501KB

  • Sample

    241127-k5y71atnen

  • MD5

    34c2ea7ae1d6665bb1697d9f69d8874d

  • SHA1

    80e020eec6ee2173126fcede3e5faec218b59a16

  • SHA256

    548e70006e3ef7b8fc06ffa4b1e04fd4fc58bc5a40b8415f7befbce75b92fe9b

  • SHA512

    ecfb300e9ee25ae9bb91b70fb533250e8a02641b8b9fa1e1ce2900bc9126daef1ba558bd7a66a8e5242e7e3c6df35384f2be1b6a0c2a09db82e73958ab591023

  • SSDEEP

    12288:MuYPABqG93bG2zYH13IgLmfJ/+czMnKLESaK1g1R:dYPABNLGTV33I+czvFaT1R

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://powerful-avoids.sbs

https://motion-treesz.sbs

https://disobey-curly.sbs

https://leg-sate-boat.sbs

https://story-tense-faz.sbs

https://blade-govern.sbs

https://occupy-blushi.sbs

https://frogs-severz.sbs

https://push-hook.cyou

Extracted

Family

lumma

C2

https://push-hook.cyou/api

Targets

    • Target

      548e70006e3ef7b8fc06ffa4b1e04fd4fc58bc5a40b8415f7befbce75b92fe9b.exe

    • Size

      501KB

    • MD5

      34c2ea7ae1d6665bb1697d9f69d8874d

    • SHA1

      80e020eec6ee2173126fcede3e5faec218b59a16

    • SHA256

      548e70006e3ef7b8fc06ffa4b1e04fd4fc58bc5a40b8415f7befbce75b92fe9b

    • SHA512

      ecfb300e9ee25ae9bb91b70fb533250e8a02641b8b9fa1e1ce2900bc9126daef1ba558bd7a66a8e5242e7e3c6df35384f2be1b6a0c2a09db82e73958ab591023

    • SSDEEP

      12288:MuYPABqG93bG2zYH13IgLmfJ/+czMnKLESaK1g1R:dYPABNLGTV33I+czvFaT1R

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks