General
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
Family
lumma
C2
https://citydisco.bet/api
https://.crosshairc.life/api
https://mrodularmall.top/api
https://jowinjoinery.icu/api
https://legenassedk.top/api
https://htardwarehu.icu/api
https://cjlaspcorne.icu/api
https://bugildbett.top/api
https://weaponrywo.digital/api
Targets
-
-
Target
https://www.mediafire.com/folder/jukm222qfm289/Xeno+++Script
-
Lumma family
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-