General

  • Target

    5de143343cc0a2b03f076de338308ac58eda529f6814a2e2266531d8ae09fbb0.exe

  • Size

    524KB

  • Sample

    240624-bh4pjascnf

  • MD5

    864fb28b0001b98ddd896dbdc604db30

  • SHA1

    2c7691795b4313704b79c3dfe70b956e84b45a11

  • SHA256

    5de143343cc0a2b03f076de338308ac58eda529f6814a2e2266531d8ae09fbb0

  • SHA512

    a7bec87ea630cbcfb28770bda372ebb7435f753caf6b8255c06d546f11a56c60018ad75f16938d50bb88749b2a2be970c9a9708455b65e5619dc4acae5be1317

  • SSDEEP

    12288:cckdVi3+T/Tvm4YqTwEa+1mieYTAk+tvC4hV8vTuNnlv:ccoNT/laKmu6K5vTuNl

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://backcreammykiel.shop/api

Targets

    • Target

      5de143343cc0a2b03f076de338308ac58eda529f6814a2e2266531d8ae09fbb0.exe

    • Size

      524KB

    • MD5

      864fb28b0001b98ddd896dbdc604db30

    • SHA1

      2c7691795b4313704b79c3dfe70b956e84b45a11

    • SHA256

      5de143343cc0a2b03f076de338308ac58eda529f6814a2e2266531d8ae09fbb0

    • SHA512

      a7bec87ea630cbcfb28770bda372ebb7435f753caf6b8255c06d546f11a56c60018ad75f16938d50bb88749b2a2be970c9a9708455b65e5619dc4acae5be1317

    • SSDEEP

      12288:cckdVi3+T/Tvm4YqTwEa+1mieYTAk+tvC4hV8vTuNnlv:ccoNT/laKmu6K5vTuNl

    Score
    10/10
    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks