General

  • Target

    Solara.exe

  • Size

    687KB

  • Sample

    241230-y32r1axjgp

  • MD5

    7ec34df0a7309de040f3d8377c8b9624

  • SHA1

    6d94948fcd2473ecc1cc9566f7bbf0904dcfdd17

  • SHA256

    5b22523ae17968cddb6c6c0c580beec2c79d17e7f263370fb09a8970faee1176

  • SHA512

    dbafd9e62c18962f4e4b2e2ac2d3551327f30dac3f23653dfd4e548025d694a02c3ee4b752ffb76ebf4110e06647e7a4506b3307778db6f4d676d797981c9524

  • SSDEEP

    12288:ywTw2cEBlpO0c4WrkJ724yJFJ+lLYg61IOP7tCZwD0diL84AKMFT+23cePtf930l:Pw2cEBlpOkh524yJFAlLGIOzsW0kL8b3

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

https://fancywaxxers.shop/api

Extracted

Family

lumma

C2

https://fancywaxxers.shop/api

Targets

    • Target

      Solara.exe

    • Size

      687KB

    • MD5

      7ec34df0a7309de040f3d8377c8b9624

    • SHA1

      6d94948fcd2473ecc1cc9566f7bbf0904dcfdd17

    • SHA256

      5b22523ae17968cddb6c6c0c580beec2c79d17e7f263370fb09a8970faee1176

    • SHA512

      dbafd9e62c18962f4e4b2e2ac2d3551327f30dac3f23653dfd4e548025d694a02c3ee4b752ffb76ebf4110e06647e7a4506b3307778db6f4d676d797981c9524

    • SSDEEP

      12288:ywTw2cEBlpO0c4WrkJ724yJFJ+lLYg61IOP7tCZwD0diL84AKMFT+23cePtf930l:Pw2cEBlpOkh524yJFAlLGIOzsW0kL8b3

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks