General

  • Target

    daf1128b8c019e57de30ab35f804fc4fbbbb4c5b89a728751e0e9bd5cf0a3c50.exe

  • Size

    1.2MB

  • Sample

    250102-m83qpsyqct

  • MD5

    36d1c2feb746cbab8355b2ff5e5507cf

  • SHA1

    87a6fc5ce24ad4ab71789bbe5f5cc90d466e6b30

  • SHA256

    daf1128b8c019e57de30ab35f804fc4fbbbb4c5b89a728751e0e9bd5cf0a3c50

  • SHA512

    63a788852ee0ce37b98f5a683da707f72eee671b55bf17cbbcde690f908ee711643b97ebfe7f7f2b3cc1e213d1963f9704a2279b1f3e14bf724890807a8cffcb

  • SSDEEP

    24576:tI05w/i0EgOp2bAntruwSB/n5FqAmHrnaNWQu2/O7pOuSLBLXq:tI05w/i0Ed2buawK/qAmLGWx7pOLLBzq

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Extracted

Family

lumma

C2

https://framekgirus.shop/api

https://abruptyopsn.shop/api

https://wholersorie.shop/api

https://noisycuttej.shop/api

https://rabidcowse.shop/api

https://cloudewahsj.shop/api

https://tirepublicerj.shop/api

Targets

    • Target

      daf1128b8c019e57de30ab35f804fc4fbbbb4c5b89a728751e0e9bd5cf0a3c50.exe

    • Size

      1.2MB

    • MD5

      36d1c2feb746cbab8355b2ff5e5507cf

    • SHA1

      87a6fc5ce24ad4ab71789bbe5f5cc90d466e6b30

    • SHA256

      daf1128b8c019e57de30ab35f804fc4fbbbb4c5b89a728751e0e9bd5cf0a3c50

    • SHA512

      63a788852ee0ce37b98f5a683da707f72eee671b55bf17cbbcde690f908ee711643b97ebfe7f7f2b3cc1e213d1963f9704a2279b1f3e14bf724890807a8cffcb

    • SSDEEP

      24576:tI05w/i0EgOp2bAntruwSB/n5FqAmHrnaNWQu2/O7pOuSLBLXq:tI05w/i0Ed2buawK/qAmLGWx7pOLLBzq

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks