General

  • Target

    00bb8c74a3545f2971cd5b5f6761ac10c544c40dc99dab75ed01cdbd56c94d70__uncoverit.org__.sample.7z

  • Size

    136KB

  • Sample

    250126-tfvmysxjgq

  • MD5

    b8175ef33d98f414b726517ef4eb2174

  • SHA1

    0c1290f2e7642f946f21634e89c49c2abc819a06

  • SHA256

    9a5c12e47867b3c972b3c516c7c44c9fa2c115bc0653fb1b4460284612ebd405

  • SHA512

    376e927e472a5a9b84d208f2089c31e02cc349591ecaf85639bded0f7038c820a4f6c9fef9e4c13a29195067547c2cc8dee8625aa7d837b50e6cb1ab64107a27

  • SSDEEP

    3072:18us4KOVkBgqr0gNZBn5mP57t7XcJE/O3:1TsjgXaBn5CPLcJX

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://rapeflowwj.lat/api

https://crosshuaht.lat/api

https://sustainskelet.lat/api

https://aspecteirs.lat/api

https://energyaffai.lat/api

https://necklacebudi.lat/api

https://discokeyus.lat/api

https://grannyejh.lat/api

https://volcanoyev.click/api

Extracted

Family

lumma

C2

https://volcanoyev.click/api

Targets

    • Target

      00bb8c74a3545f2971cd5b5f6761ac10c544c40dc99dab75ed01cdbd56c94d70__uncoverit.org__.sample

    • Size

      295KB

    • MD5

      8506029e1bf3c13b5151acf8c925ec03

    • SHA1

      7fd8094efcde2ae4f613df4e859ed07791dd9df1

    • SHA256

      00bb8c74a3545f2971cd5b5f6761ac10c544c40dc99dab75ed01cdbd56c94d70

    • SHA512

      6d9d744d5f97c30051ea7e052779afdec047a5c6c1eed4b37ecdf48a18fc56eb8bd5f1e241fc65d20dfde358a5945cfe1d35c0938d85e574fe5c2163157ecab3

    • SSDEEP

      6144:SkK6W/39Y4zbD5ozoOxMEpgSVumtLoYgXCuVy1w5XTlLU:RWf9Y4zbNUcQbBgXhVy1w5XJL

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

MITRE ATT&CK Enterprise v15

Tasks