General

  • Target

    N.zip

  • Size

    322KB

  • Sample

    250110-ardn2axqbm

  • MD5

    26d36b363020e5a05f016239e56a8a71

  • SHA1

    8a8b769c363bf9353ec6ec40dd4019760c0aa963

  • SHA256

    a33e27dcad9a2dc5af96a85a97e9e78ca56ea50c5d2fe0d3faaaee61ea1f3890

  • SHA512

    d84808ab1a81acaa81783211e7ef48a6431bd9d48f0d710d43e47e9cc6b75d8511eb9b040b26532809c2c41cecf871868e3beb2dacc7a245cd4cfd8ee6ecb7fd

  • SSDEEP

    6144:edpGCW63cbQ6lKYoeV4DdtFKivaL/1/lGF0geR5aNjHn5cEqqb:eE363yQ6j4dDK8w9/EHbjHCAb

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://fraggielek.biz/api

https://grandiouseziu.biz/api

https://littlenotii.biz/api

https://marketlumpe.biz/api

https://nuttyshopr.biz/api

https://punishzement.biz/api

https://spookycappy.biz/api

https://truculengisau.biz/api

Targets

    • Target

      Nexol.exe

    • Size

      336KB

    • MD5

      df6e1225e3f7742dd9acbbbd14ce246a

    • SHA1

      6390796d5b6e453bed100439be5d89ef9a9066e5

    • SHA256

      33ae6c44a08efb52c0c69a8f8827f2afab230cce1cf9652fc63237d2e30622a4

    • SHA512

      72b2b577b7b3a59401f455079cf79fa8e9c874c6c0293f984c5f726b9fa07ef59924790093709a86654db91a14d9565682c17093ee9cdb0df17ecff71ba1686c

    • SSDEEP

      6144:cVQkSbQElKYoeV4bd1FKCvaL/1vlGF0UeR5aNj7nucEqq9:0QLQEjCdbKcw9vEdbj7hA9

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks