General

  • Target

    a57f2d5d623439d54d5a8089426c6912e2e35b1087ce4b5615f2eae80730a814.exe

  • Size

    7.7MB

  • Sample

    250227-ehjwxavps6

  • MD5

    17043ad253ce5ac175e7f182d90fb17b

  • SHA1

    87c47085ee4d8e949f5ef0a49fd5ead7fcb52c36

  • SHA256

    a57f2d5d623439d54d5a8089426c6912e2e35b1087ce4b5615f2eae80730a814

  • SHA512

    f57cde32ced224ef1b1d28c3ed9f2bd6d4f43d29104c934ac8e71d087b5fd852aa07f24a445a8f06afdf4a61517e417a9294bfcd2611fdc19b102c66bd56c9ea

  • SSDEEP

    98304:imT3M7xrLMzrNDHf9OjEXIPJO8pC8sklHcNW2LVu5ROqRr+JLDsCTxkTcVoqBmgx:JJMvKu50Um

Malware Config

Extracted

Family

lumma

C2

https://paleboreei.biz/api

Targets

    • Target

      a57f2d5d623439d54d5a8089426c6912e2e35b1087ce4b5615f2eae80730a814.exe

    • Size

      7.7MB

    • MD5

      17043ad253ce5ac175e7f182d90fb17b

    • SHA1

      87c47085ee4d8e949f5ef0a49fd5ead7fcb52c36

    • SHA256

      a57f2d5d623439d54d5a8089426c6912e2e35b1087ce4b5615f2eae80730a814

    • SHA512

      f57cde32ced224ef1b1d28c3ed9f2bd6d4f43d29104c934ac8e71d087b5fd852aa07f24a445a8f06afdf4a61517e417a9294bfcd2611fdc19b102c66bd56c9ea

    • SSDEEP

      98304:imT3M7xrLMzrNDHf9OjEXIPJO8pC8sklHcNW2LVu5ROqRr+JLDsCTxkTcVoqBmgx:JJMvKu50Um

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks