General

  • Target

    2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatch

  • Size

    6.0MB

  • Sample

    250227-hypnwaztbz

  • MD5

    a2ab6183df2e5993bd1caabd8738e14a

  • SHA1

    c953195e5291954bd6aef6cb89f165387c4895d1

  • SHA256

    0c1b2a64482258bc821a9700c2203768b0f7b3eb590e13919d890becf51a8b7a

  • SHA512

    7934df07e408eadc49312ae9b2aaee5a64b58649fd47af9718b4cf90e306f49b8c5ac459350444c9afdbda28ff9c6a8ea3170e399defabcbd1686032fc91be0d

  • SSDEEP

    49152:YLlt90ZzSvd+rMdmBcHF4mL8jIr1zrAwZK7eFiDrHb2rjPNtBO6NuxpGh5pFN7nO:2lt9b+mV8ju1zJU6NuUpFN7nKGh39LK

Malware Config

Extracted

Family

lumma

C2

https://reinforcenh.shop/api

https://stogeneratmns.shop/api

https://fragnantbui.shop/api

https://drawzhotdog.shop/api

https://vozmeatillu.shop/api

https://offensivedzvju.shop/api

https://ghostreedmnu.shop/api

https://gutterydhowi.shop/api

Targets

    • Target

      2025-02-27_a2ab6183df2e5993bd1caabd8738e14a_frostygoop_poet-rat_ramnit_sliver_snatch

    • Size

      6.0MB

    • MD5

      a2ab6183df2e5993bd1caabd8738e14a

    • SHA1

      c953195e5291954bd6aef6cb89f165387c4895d1

    • SHA256

      0c1b2a64482258bc821a9700c2203768b0f7b3eb590e13919d890becf51a8b7a

    • SHA512

      7934df07e408eadc49312ae9b2aaee5a64b58649fd47af9718b4cf90e306f49b8c5ac459350444c9afdbda28ff9c6a8ea3170e399defabcbd1686032fc91be0d

    • SSDEEP

      49152:YLlt90ZzSvd+rMdmBcHF4mL8jIr1zrAwZK7eFiDrHb2rjPNtBO6NuxpGh5pFN7nO:2lt9b+mV8ju1zJU6NuUpFN7nKGh39LK

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks