General

  • Target

    7f3bcf6644fd8551a83cc1f4bf126c4f.bin

  • Size

    2.6MB

  • Sample

    250107-btx15azkgq

  • MD5

    70e609c4be9e0923d0d30f4df4e40324

  • SHA1

    eeda8fd1a616d7ba4292b677c546b26164b72f6e

  • SHA256

    4d63997cad19801ac5dd11bc63d4ca939c86b2e1b74cf585fb6e70c0e4ab94cf

  • SHA512

    daecb589181ddee2840bc7bf31ceecc9af465aa4c4295beb2bdc195b99b4b3c05a89171569539c586a99648141d3bd3a8593c8d3f46fcf08c6c8c73a55dfe75f

  • SSDEEP

    49152:SbukUi0/Xiq0+d67eqkWVnR0MHCO1er7XAcBJ5CyWVyjg8btSA2aR:iur/B06aeFWHH5G7wcBJlW2Sq

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Targets

    • Target

      e8cbb5212a46cf5f4962e91e955b71891ffbb3477bef67d92c0949e03c4cb40b.exe

    • Size

      2.7MB

    • MD5

      7f3bcf6644fd8551a83cc1f4bf126c4f

    • SHA1

      3c6a6763d27860dae7087b92dbf02a07d1bdfb6c

    • SHA256

      e8cbb5212a46cf5f4962e91e955b71891ffbb3477bef67d92c0949e03c4cb40b

    • SHA512

      6d03379514771cdadb2376f147589721e7e71b15e20c8072f6435f7a5f000deafab11748ba16c6250093659a2c1dd7e22210efa5f95e881f94562a92a79be328

    • SSDEEP

      49152:wtBvGG3ZFBXst5p3ma6RmT7IEkUmuKLueq2nk13RfD+UiLH:wt1GUBQ5NmLK7IvUP5L11BLgH

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks