General

  • Target

    8ddb8e92032cbe0758431e0866b6bee6426e2f6422d3b00b26cb03c4f213785f

  • Size

    6.4MB

  • Sample

    240701-fq8qnszgrq

  • MD5

    5050f9bc5d4a4cec3d2c08ed24480a10

  • SHA1

    c3edc7c64810ece5a5fd4b9bc082b1f4dac7bf7f

  • SHA256

    8ddb8e92032cbe0758431e0866b6bee6426e2f6422d3b00b26cb03c4f213785f

  • SHA512

    2f62f4cba6a76681a0ecbb9977120978369ccd8bd2089227d1c581e30c190441f50f5561307eea737a28f625092287c6a6a0eaa924421d8789a72197d83062e6

  • SSDEEP

    98304:6qwBqwWpcCHgb9m429vfTbDJgAWdWikDIyx2yR1OcS/7yMimxwnpyYOF8:6qwBqw16I9evL9Zik0k20wGnOa

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://foodypannyjsud.shop/api

https://potterryisiw.shop/api

https://contintnetksows.shop/api

https://reinforcedirectorywd.shop/api

Targets

    • Target

      8ddb8e92032cbe0758431e0866b6bee6426e2f6422d3b00b26cb03c4f213785f

    • Size

      6.4MB

    • MD5

      5050f9bc5d4a4cec3d2c08ed24480a10

    • SHA1

      c3edc7c64810ece5a5fd4b9bc082b1f4dac7bf7f

    • SHA256

      8ddb8e92032cbe0758431e0866b6bee6426e2f6422d3b00b26cb03c4f213785f

    • SHA512

      2f62f4cba6a76681a0ecbb9977120978369ccd8bd2089227d1c581e30c190441f50f5561307eea737a28f625092287c6a6a0eaa924421d8789a72197d83062e6

    • SSDEEP

      98304:6qwBqwWpcCHgb9m429vfTbDJgAWdWikDIyx2yR1OcS/7yMimxwnpyYOF8:6qwBqw16I9evL9Zik0k20wGnOa

    Score
    10/10
    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Executes dropped EXE

    • Loads dropped DLL

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

MITRE ATT&CK Matrix ATT&CK v13

Tasks