General

  • Target

    ReleeseBoostrappers.exe

  • Size

    1.1MB

  • Sample

    250104-qxj11atpgr

  • MD5

    1c8f61ebae1e301d9b521e2e4661ea71

  • SHA1

    e4419155b9e29c822bb82430222a466f8d18c979

  • SHA256

    04cb3fda38692e884e8782a79b4b431cc2f50a3a0a7bd4c368f35df4b536e6ac

  • SHA512

    c09777c8d426b3320c2cbe828b20dfe516773d28a8f24f8c1e58ad1bbcf838cbf3eaa6b0960a0ea2b939d1beb38c9a321681afe24cd49878c9cca9563c75bb50

  • SSDEEP

    24576:zFKaf+2MOlrq3F1rjhrRQirOO3GrR1YNgjUytyVXyoso+fvVBZM04k87:Zdm2Hl2VveRH0yoD+nZMn97

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Targets

    • Target

      ReleeseBoostrappers.exe

    • Size

      1.1MB

    • MD5

      1c8f61ebae1e301d9b521e2e4661ea71

    • SHA1

      e4419155b9e29c822bb82430222a466f8d18c979

    • SHA256

      04cb3fda38692e884e8782a79b4b431cc2f50a3a0a7bd4c368f35df4b536e6ac

    • SHA512

      c09777c8d426b3320c2cbe828b20dfe516773d28a8f24f8c1e58ad1bbcf838cbf3eaa6b0960a0ea2b939d1beb38c9a321681afe24cd49878c9cca9563c75bb50

    • SSDEEP

      24576:zFKaf+2MOlrq3F1rjhrRQirOO3GrR1YNgjUytyVXyoso+fvVBZM04k87:Zdm2Hl2VveRH0yoD+nZMn97

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks