General

  • Target

    loader.exe

  • Size

    385KB

  • Sample

    250108-v66ctaxjct

  • MD5

    6844fba0aadfa5f0ac0176477eb15b83

  • SHA1

    8fefd44737ffbb588cbd032a39d83fff50e2acc7

  • SHA256

    b6892085034b9bc44842b77b168519cec0daa8c2b06525337cfcebeba8bfd028

  • SHA512

    f7554a9787fc9a7621e2962792ae0e39f266fed11efbe758a018f57df34dfb799cd9cea18d67dc557564d0be673216ab8c056be92972320e9bf6f31a7f42237c

  • SSDEEP

    6144:A0bS4ZyK0FboqEMlmJV5y9pZm1yCQIEnNek2qZq8wC6NL3O8sYWR6T+aZLzjr6:A0b9ATGo93Gy9nN5Zq8wNNLsX6bL2

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://robinsharez.shop/api

https://handscreamny.shop/api

https://chipdonkeruz.shop/api

https://versersleep.shop/api

https://crowdwarek.shop/api

https://apporholis.shop/api

https://femalsabler.shop/api

https://soundtappysk.shop/api

https://letterdrive.shop/api

Targets

    • Target

      loader.exe

    • Size

      385KB

    • MD5

      6844fba0aadfa5f0ac0176477eb15b83

    • SHA1

      8fefd44737ffbb588cbd032a39d83fff50e2acc7

    • SHA256

      b6892085034b9bc44842b77b168519cec0daa8c2b06525337cfcebeba8bfd028

    • SHA512

      f7554a9787fc9a7621e2962792ae0e39f266fed11efbe758a018f57df34dfb799cd9cea18d67dc557564d0be673216ab8c056be92972320e9bf6f31a7f42237c

    • SSDEEP

      6144:A0bS4ZyK0FboqEMlmJV5y9pZm1yCQIEnNek2qZq8wC6NL3O8sYWR6T+aZLzjr6:A0b9ATGo93Gy9nN5Zq8wNNLsX6bL2

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks