General

  • Target

    redirect

  • Size

    6KB

  • Sample

    241230-cw6lqavmhr

  • MD5

    c398de9d6322486130937b6ff56431af

  • SHA1

    a92376812e7c6c5b7f41730c6c529e8d735ce185

  • SHA256

    a23eb9fe20f786cca4328fd9395ce4e36c092fc982a47b2c1ba3d6d071b5b1af

  • SHA512

    cebcd61854d0256b6fc757277b8fcf74a31effe386c10cbc8812351996839242e22096f111de2d0103c9c97f6c5ab28fe3aed0062f1b447c98367f4c2fb79fb8

  • SSDEEP

    192:dWHLxX7777/77QF799yrQ0Lod4BYCIkg3OPwX+Cf+:dWr5HYh0+CIkaO4X/W

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://abruptyopsn.shop/api

https://wholersorie.shop/api

https://framekgirus.shop/api

https://tirepublicerj.shop/api

https://noisycuttej.shop/api

https://rabidcowse.shop/api

Targets

    • Target

      redirect

    • Size

      6KB

    • MD5

      c398de9d6322486130937b6ff56431af

    • SHA1

      a92376812e7c6c5b7f41730c6c529e8d735ce185

    • SHA256

      a23eb9fe20f786cca4328fd9395ce4e36c092fc982a47b2c1ba3d6d071b5b1af

    • SHA512

      cebcd61854d0256b6fc757277b8fcf74a31effe386c10cbc8812351996839242e22096f111de2d0103c9c97f6c5ab28fe3aed0062f1b447c98367f4c2fb79fb8

    • SSDEEP

      192:dWHLxX7777/77QF799yrQ0Lod4BYCIkg3OPwX+Cf+:dWr5HYh0+CIkaO4X/W

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • A potential corporate email address has been identified in the URL: [email protected]

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks