General

  • Target

    https://cvasdf.click/?startcrack=%3C?php%20echo%20substr(md5(microtime()),0,rand(10,30));?%3E&x=4&kristo=%3C?php%20echo%20substr(md5(microtime()),0,rand(7,27));?%3E&p=%3C?php%20echo%20the_title();?%3E

  • Sample

    250109-2n14pswjaj

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://robinsharez.shop/api

https://handscreamny.shop/api

https://chipdonkeruz.shop/api

https://versersleep.shop/api

https://crowdwarek.shop/api

https://apporholis.shop/api

https://femalsabler.shop/api

https://soundtappysk.shop/api

https://induceboori.cyou/api

Extracted

Family

lumma

C2

https://induceboori.cyou/api

Targets

    • Target

      https://cvasdf.click/?startcrack=%3C?php%20echo%20substr(md5(microtime()),0,rand(10,30));?%3E&x=4&kristo=%3C?php%20echo%20substr(md5(microtime()),0,rand(7,27));?%3E&p=%3C?php%20echo%20the_title();?%3E

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks