General

  • Target

    e8cbb5212a46cf5f4962e91e955b71891ffbb3477bef67d92c0949e03c4cb40b.exe

  • Size

    2.7MB

  • Sample

    250106-dt9q2axjfj

  • MD5

    7f3bcf6644fd8551a83cc1f4bf126c4f

  • SHA1

    3c6a6763d27860dae7087b92dbf02a07d1bdfb6c

  • SHA256

    e8cbb5212a46cf5f4962e91e955b71891ffbb3477bef67d92c0949e03c4cb40b

  • SHA512

    6d03379514771cdadb2376f147589721e7e71b15e20c8072f6435f7a5f000deafab11748ba16c6250093659a2c1dd7e22210efa5f95e881f94562a92a79be328

  • SSDEEP

    49152:wtBvGG3ZFBXst5p3ma6RmT7IEkUmuKLueq2nk13RfD+UiLH:wt1GUBQ5NmLK7IvUP5L11BLgH

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Extracted

Family

lumma

C2

https://abruptyopsn.shop/api

https://wholersorie.shop/api

https://framekgirus.shop/api

https://tirepublicerj.shop/api

https://noisycuttej.shop/api

https://rabidcowse.shop/api

https://cloudewahsj.shop/api

Targets

    • Target

      e8cbb5212a46cf5f4962e91e955b71891ffbb3477bef67d92c0949e03c4cb40b.exe

    • Size

      2.7MB

    • MD5

      7f3bcf6644fd8551a83cc1f4bf126c4f

    • SHA1

      3c6a6763d27860dae7087b92dbf02a07d1bdfb6c

    • SHA256

      e8cbb5212a46cf5f4962e91e955b71891ffbb3477bef67d92c0949e03c4cb40b

    • SHA512

      6d03379514771cdadb2376f147589721e7e71b15e20c8072f6435f7a5f000deafab11748ba16c6250093659a2c1dd7e22210efa5f95e881f94562a92a79be328

    • SSDEEP

      49152:wtBvGG3ZFBXst5p3ma6RmT7IEkUmuKLueq2nk13RfD+UiLH:wt1GUBQ5NmLK7IvUP5L11BLgH

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks