General

  • Target

    f492c7f1d585c855f684b1d4c7637751c2d4479469f9b05b377a6578b24763aa.zip

  • Size

    636KB

  • Sample

    241220-d6twcayqdm

  • MD5

    2d44fb4451ea72c65084e0c1e8b6aad1

  • SHA1

    60095c88704131a9c7710838167eed42abcabcb2

  • SHA256

    f492c7f1d585c855f684b1d4c7637751c2d4479469f9b05b377a6578b24763aa

  • SHA512

    3a2f10f3a5d9c0339eec212ccfd372abc1e2b9190d214f4d14ce89a5a538c740c2a42c2f8fbc1f6f0aa3f4d578030511cd791ac0bfb0f25a31de6ab59afcfe10

  • SSDEEP

    12288:MCDtkU919/dqfdFmE0ijodK22uJa+WmSMZSbckd3VCrdZS5oyDC:59H/8bmE/odK22uJaIEbLd3VCrdZ7+C

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://servicedny.site/api

https://authorisev.site/api

https://faulteyotk.site/api

https://dilemmadu.site/api

https://contemteny.site/api

https://goalyfeastz.site/api

https://opposezmny.site/api

https://seallysl.site/api

https://forbidstow.site/api

Targets

    • Target

      xnsjjxja.exe

    • Size

      1.0MB

    • MD5

      fca874fcb9f344ec26f3ae4d359e75d7

    • SHA1

      f21315cd57ec269b43d6afba58febe39793b72f2

    • SHA256

      56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce

    • SHA512

      26b15070ebd0cce7a9c4b2f9188bf5a0fbc30724ffbb48c590e7f2379af896ef05e5a2f8f39462c50aaaa91c57f36394b54453a97b9f779aad379f5d24db8e0e

    • SSDEEP

      24576:1+BNeMxzXC64aUn+EbWKpFOEMalcU3Aa2FTL3JkMt4Qe1CqxO9zTp:cLDxzXC64aUnqKpHlv3Al7JH4t1CUy

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks