General

  • Target

    6464aabf36888f34181ffea25f4c535afd1b83cc46e42e909ef3f691cbd27be7.zip

  • Size

    7.9MB

  • Sample

    241230-f699fazlbn

  • MD5

    510d5f1d0b00f305872cc94f0db0fbd7

  • SHA1

    8203d002b1bf8e18ecc7aeafeefee47a9e80dea6

  • SHA256

    6464aabf36888f34181ffea25f4c535afd1b83cc46e42e909ef3f691cbd27be7

  • SHA512

    f36cc7c33db329f5055e7936574d59f9ad2237ad6256c0b90f6a89376f761e731bcd92c4033cc7c7f400dc8b194f25fab4757610e50c8797360d1212521e7b4f

  • SSDEEP

    196608:K6kpplCLw6Cv38FkjLYL3nBfSPVS7vtx0BKBiJkNp+6Py:K6pfCv3MkjEL3BfwVSTSeiO7+66

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://crib-endanger.sbs/api

https://faintbl0w.sbs/api

https://300snails.sbs/api

https://bored-light.sbs/api

https://3xc1aimbl0w.sbs/api

https://pull-trucker.sbs/api

https://fleez-inc.sbs/api

https://thicktoys.sbs/api

Targets

    • Target

      reiboot licensed email and registration code free.exe

    • Size

      903.0MB

    • MD5

      9919980b5380785aad93aa04498138a7

    • SHA1

      c4d21a82e70d2f7a552c88d38190d6169da0f9f7

    • SHA256

      542680fc792eaabdcb078f2936f3b102ca201541977e7e8655a215b5145d5d27

    • SHA512

      09672f01c43636643962cf0884cc3d28948526883bcb5c22252bdc86b878ce7a8c006deb02a1182e74f1089e2a0ee3a71623a9e11d0d5e2674c344ac3b0316ed

    • SSDEEP

      1572864:Q7cZfns+Fp3l1jSipMLBr/EFQFLe8syMJvV3P/oFk6MBwFAtoFeWLFhK:cmV

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks