General

  • Target

    2025-01-08_f1c365e279cf9edcbbee531e54be1f40_frostygoop_poet-rat_snatch

  • Size

    5.5MB

  • Sample

    250108-1jybksxkfk

  • MD5

    f1c365e279cf9edcbbee531e54be1f40

  • SHA1

    b54b9151e5b1ea598b0bfe7caef08f6bb8a572c8

  • SHA256

    b2e1a2ed2aee69cf324d92473b38a193b53b6286239092cfb9ef527d1352308a

  • SHA512

    43777a7f1ade7b44bbcbd6e013feb6edfde830ce464b6a2d6d78b037f3466f4087bebd384d80d32c88f94101d3cf8c70a046f350d0fc50ecb03eee8bc7696a86

  • SSDEEP

    49152:fbz4drgkytWDT+W162OVJKc0MdXaGbVmoSw67Hv3YiWq0aPFA05ugX6x1NIzLbro:fv4NEtWX/1bMd3qnag+

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Targets

    • Target

      2025-01-08_f1c365e279cf9edcbbee531e54be1f40_frostygoop_poet-rat_snatch

    • Size

      5.5MB

    • MD5

      f1c365e279cf9edcbbee531e54be1f40

    • SHA1

      b54b9151e5b1ea598b0bfe7caef08f6bb8a572c8

    • SHA256

      b2e1a2ed2aee69cf324d92473b38a193b53b6286239092cfb9ef527d1352308a

    • SHA512

      43777a7f1ade7b44bbcbd6e013feb6edfde830ce464b6a2d6d78b037f3466f4087bebd384d80d32c88f94101d3cf8c70a046f350d0fc50ecb03eee8bc7696a86

    • SSDEEP

      49152:fbz4drgkytWDT+W162OVJKc0MdXaGbVmoSw67Hv3YiWq0aPFA05ugX6x1NIzLbro:fv4NEtWX/1bMd3qnag+

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks