General

  • Target

    2024-11-27_9a11d578aec96645e55e6d3ad1a10754_cobalt-strike_ryuk

  • Size

    12.6MB

  • Sample

    241127-kdc6fssnan

  • MD5

    9a11d578aec96645e55e6d3ad1a10754

  • SHA1

    68081fd06eb00b786eedd77d04bf2bcdd8c96c59

  • SHA256

    41f3765a0f5435e542209f28978ed7ebcadee49913ad39ca5e07bf3fd65e365d

  • SHA512

    ed422416b6268d9b34d5c007db106532b3f9d23786fcb9c06c05cd5f741381b5668a9a75feeda7ae2aa21fe3f55dd19ab85a55fe8685ac9a382036cefc89139a

  • SSDEEP

    196608:t1dTxDY6HrI5x0wcs3FUYQUWzaf5hjlzQXP5vOjKAlAKTEEO7V8gi+:xpjr+OwcsVUYQUW+hhpexUKTK6h

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://powerful-avoids.sbs

https://motion-treesz.sbs

https://disobey-curly.sbs

https://leg-sate-boat.sbs

https://story-tense-faz.sbs

https://blade-govern.sbs

https://occupy-blushi.sbs

https://frogs-severz.sbs

https://understanyb.cyou

Extracted

Family

lumma

C2

https://understanyb.cyou/api

Targets

    • Target

      2024-11-27_9a11d578aec96645e55e6d3ad1a10754_cobalt-strike_ryuk

    • Size

      12.6MB

    • MD5

      9a11d578aec96645e55e6d3ad1a10754

    • SHA1

      68081fd06eb00b786eedd77d04bf2bcdd8c96c59

    • SHA256

      41f3765a0f5435e542209f28978ed7ebcadee49913ad39ca5e07bf3fd65e365d

    • SHA512

      ed422416b6268d9b34d5c007db106532b3f9d23786fcb9c06c05cd5f741381b5668a9a75feeda7ae2aa21fe3f55dd19ab85a55fe8685ac9a382036cefc89139a

    • SSDEEP

      196608:t1dTxDY6HrI5x0wcs3FUYQUWzaf5hjlzQXP5vOjKAlAKTEEO7V8gi+:xpjr+OwcsVUYQUW+hhpexUKTK6h

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks