General
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
Family
lumma
C2
https://robinsharez.shop/api
https://handscreamny.shop/api
https://chipdonkeruz.shop/api
https://versersleep.shop/api
https://crowdwarek.shop/api
https://apporholis.shop/api
https://femalsabler.shop/api
https://soundtappysk.shop/api
Targets
-
-
Lumma family
-
Blocklisted process makes network request
-
A potential corporate email address has been identified in the URL: [email protected]
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2