General

  • Target

    7f2cf17737824e9bf6655191610d25ba2219f7056f67af5a5492187fd47458ae.zip

  • Size

    358KB

  • Sample

    250107-acbk5awnaq

  • MD5

    8418dd96948129d52e0c2abe7603db79

  • SHA1

    5db28474a1f2152d295e0faed6200abafafda9c4

  • SHA256

    7f2cf17737824e9bf6655191610d25ba2219f7056f67af5a5492187fd47458ae

  • SHA512

    6c998c47e8fc677b919c298c8fb08b51116fc2dcd40fb57c01fa8039c302632de41af2fbbb547f8f150a4a0be854df787b290fa949952cfec875433f7fb5b07c

  • SSDEEP

    6144:SRF44VHPF10mDDHs33kXIFNzXUOH0wL5rgYKCCru7+f8JDCDFwy:S744Bd1lDDU3kQbFnxjVQ4Dwwy

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

https://fancywaxxers.shop/api

Targets

    • Target

      7f2cf17737824e9bf6655191610d25ba2219f7056f67af5a5492187fd47458ae.zip

    • Size

      358KB

    • MD5

      8418dd96948129d52e0c2abe7603db79

    • SHA1

      5db28474a1f2152d295e0faed6200abafafda9c4

    • SHA256

      7f2cf17737824e9bf6655191610d25ba2219f7056f67af5a5492187fd47458ae

    • SHA512

      6c998c47e8fc677b919c298c8fb08b51116fc2dcd40fb57c01fa8039c302632de41af2fbbb547f8f150a4a0be854df787b290fa949952cfec875433f7fb5b07c

    • SSDEEP

      6144:SRF44VHPF10mDDHs33kXIFNzXUOH0wL5rgYKCCru7+f8JDCDFwy:S744Bd1lDDU3kQbFnxjVQ4Dwwy

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks