General

  • Target

    b--o--t--s--t--r--a--p-x64.zip

  • Size

    12.0MB

  • Sample

    250127-1qz4raxler

  • MD5

    3c3185803d3bc3ac05daa690ac28fd5e

  • SHA1

    5f2a217f2b3d1eaa872c37b3094c60c33bba0930

  • SHA256

    6e2abb83c7dac9f203ba6cdb4be11fe3ba64c783d197bc54221eb220f48dcd07

  • SHA512

    75afdced01f933823ed37e2f3b6d2296421e255c170372d96799e81ef702ab9539d924f5851e3553cc13b6afa0ae0c9d7686513dd3287cd6eae88aa88b7166ff

  • SSDEEP

    196608:Ypk+8bgSAY3rVUsUCi7mh4JlLFr2XrJP45CaTO7x8kaN9Sb+g896tJONKUfg9r0:lgSAY3rVUdC54JlLIX1sT2x8kPiV96tw

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://toppyneedus.biz/api

Targets

    • Target

      b--o--t--s--t--r--a--p-x64.zip

    • Size

      12.0MB

    • MD5

      3c3185803d3bc3ac05daa690ac28fd5e

    • SHA1

      5f2a217f2b3d1eaa872c37b3094c60c33bba0930

    • SHA256

      6e2abb83c7dac9f203ba6cdb4be11fe3ba64c783d197bc54221eb220f48dcd07

    • SHA512

      75afdced01f933823ed37e2f3b6d2296421e255c170372d96799e81ef702ab9539d924f5851e3553cc13b6afa0ae0c9d7686513dd3287cd6eae88aa88b7166ff

    • SSDEEP

      196608:Ypk+8bgSAY3rVUsUCi7mh4JlLFr2XrJP45CaTO7x8kaN9Sb+g896tJONKUfg9r0:lgSAY3rVUdC54JlLIX1sT2x8kPiV96tw

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks