General

  • Target

    Xeno-Executor.exe

  • Size

    709KB

  • Sample

    250113-2s6jzszlhx

  • MD5

    0fe991a24c993e852f41043c7f896e29

  • SHA1

    4f6f3c2230c8f4ad575502c2502c9d550e110432

  • SHA256

    d49131d26f9b130f04ab3ffaea57e86a2fdf90ba84001a8acb3fbe36d63186df

  • SHA512

    030100853a58924d5e1fe858e1bd15b25e8b4d1268fca5a84097eb13e1e4a01e68f3b595034130b4c3753ac24ff036633ea73f5ee89293c5458371c864d20db1

  • SSDEEP

    12288:7yNudyx57oP4Sj8qYS346jvBGDIHHUMF5AATSj8qYS346jvBGDIHHUMF5AAp:7+3x5sASj8TS344sW0Mn1TSj8TS344sc

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

Targets

    • Target

      Xeno-Executor.exe

    • Size

      709KB

    • MD5

      0fe991a24c993e852f41043c7f896e29

    • SHA1

      4f6f3c2230c8f4ad575502c2502c9d550e110432

    • SHA256

      d49131d26f9b130f04ab3ffaea57e86a2fdf90ba84001a8acb3fbe36d63186df

    • SHA512

      030100853a58924d5e1fe858e1bd15b25e8b4d1268fca5a84097eb13e1e4a01e68f3b595034130b4c3753ac24ff036633ea73f5ee89293c5458371c864d20db1

    • SSDEEP

      12288:7yNudyx57oP4Sj8qYS346jvBGDIHHUMF5AATSj8qYS346jvBGDIHHUMF5AAp:7+3x5sASj8TS344sW0Mn1TSj8TS344sc

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks