General

  • Target

    Solara.zip

  • Size

    2.8MB

  • Sample

    241231-z95ynssnar

  • MD5

    0c5525f5bcd0c9610cd6ebf5923dfa41

  • SHA1

    df7a895642b88cd99c6e3ddd30d5585778cd866e

  • SHA256

    34055dd74bee23c85ea6d2d8649915ed976ee750989c64be9b7b97ff36621d83

  • SHA512

    08d66ad5e41f215002e858585a4e3367e5f50102d370f811d0d8a67680ffb66495d40d54196c6e353dacdc87322b2bf38c3f13191d5d3b067b3c4d0deee316dc

  • SSDEEP

    49152:nfEkBcsjT/TcQvOVnFjfy/AMWQ1XyGZGhLPJhJkwNmRTsfO+Ykf24/LIzKlbTOUA:hBcsjfFvWFTyZXhfGpJhJ3A5eQkf2UkH

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

https://fancywaxxers.shop/api

Targets

    • Target

      Solara.zip

    • Size

      2.8MB

    • MD5

      0c5525f5bcd0c9610cd6ebf5923dfa41

    • SHA1

      df7a895642b88cd99c6e3ddd30d5585778cd866e

    • SHA256

      34055dd74bee23c85ea6d2d8649915ed976ee750989c64be9b7b97ff36621d83

    • SHA512

      08d66ad5e41f215002e858585a4e3367e5f50102d370f811d0d8a67680ffb66495d40d54196c6e353dacdc87322b2bf38c3f13191d5d3b067b3c4d0deee316dc

    • SSDEEP

      49152:nfEkBcsjT/TcQvOVnFjfy/AMWQ1XyGZGhLPJhJkwNmRTsfO+Ykf24/LIzKlbTOUA:hBcsjfFvWFTyZXhfGpJhJ3A5eQkf2UkH

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks