General

  • Target

    2025-01-25_de0c58184b144682937ad583f399acfd_frostygoop_poet-rat_snatch

  • Size

    11.3MB

  • Sample

    250125-rt5zqswqex

  • MD5

    de0c58184b144682937ad583f399acfd

  • SHA1

    a16cb29a8d7100fd56dd87a8352539f80cf6040f

  • SHA256

    7648967679b5c0d71910ddd7c97f399d0f929f3ae31fb6020ee1272b2be0b4b2

  • SHA512

    4ee37216037a03264278b16b849d8a6d7beb93dbf96ad47b93f46437b78aa40de8201c1da6cccc9143edd522a72bfcd21fa4104fd5758124c7d2a960808d45e3

  • SSDEEP

    98304:c1tPv4nil4FZCa/sMwvIuCB7dtKk9o/0/XvFyrMuVPJGoL2MG:QtH6HsMwguWdQ8j/Xvk4uhJGTt

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://kitestarepatt.click/api

Targets

    • Target

      2025-01-25_de0c58184b144682937ad583f399acfd_frostygoop_poet-rat_snatch

    • Size

      11.3MB

    • MD5

      de0c58184b144682937ad583f399acfd

    • SHA1

      a16cb29a8d7100fd56dd87a8352539f80cf6040f

    • SHA256

      7648967679b5c0d71910ddd7c97f399d0f929f3ae31fb6020ee1272b2be0b4b2

    • SHA512

      4ee37216037a03264278b16b849d8a6d7beb93dbf96ad47b93f46437b78aa40de8201c1da6cccc9143edd522a72bfcd21fa4104fd5758124c7d2a960808d45e3

    • SSDEEP

      98304:c1tPv4nil4FZCa/sMwvIuCB7dtKk9o/0/XvFyrMuVPJGoL2MG:QtH6HsMwguWdQ8j/Xvk4uhJGTt

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks