General

  • Target

    c234cdee62048c2529005241c0dd2a9413e0c6201cebd793985e3511f5cafe6b

  • Size

    17.9MB

  • Sample

    240701-fsmk8axbpg

  • MD5

    5f43d8f10c84f166a69eeea31229a4ae

  • SHA1

    3876d8bfb443b9bbbff5b3f34e0fc57357930efa

  • SHA256

    c234cdee62048c2529005241c0dd2a9413e0c6201cebd793985e3511f5cafe6b

  • SHA512

    af9b64ef2a20a5af075ce23fb5a3ae13592fccab4189eaed532fde46d43cf0230095b2d0d78cf7d0f7f9f29dd241c2b729e17f09bec2daa4d2ca4fb56a2c890b

  • SSDEEP

    98304:Q/PL8Lelkmo3OhN0eMWNOgLN1wGkxXUtzlwEM8FNJlliOliuXdj:Q1im2OhNuoYUVMKtliuh

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://invisibledovereats.shop/api

https://potterryisiw.shop/api

https://foodypannyjsud.shop/api

https://contintnetksows.shop/api

https://reinforcedirectorywd.shop/api

Targets

    • Target

      c234cdee62048c2529005241c0dd2a9413e0c6201cebd793985e3511f5cafe6b

    • Size

      17.9MB

    • MD5

      5f43d8f10c84f166a69eeea31229a4ae

    • SHA1

      3876d8bfb443b9bbbff5b3f34e0fc57357930efa

    • SHA256

      c234cdee62048c2529005241c0dd2a9413e0c6201cebd793985e3511f5cafe6b

    • SHA512

      af9b64ef2a20a5af075ce23fb5a3ae13592fccab4189eaed532fde46d43cf0230095b2d0d78cf7d0f7f9f29dd241c2b729e17f09bec2daa4d2ca4fb56a2c890b

    • SSDEEP

      98304:Q/PL8Lelkmo3OhN0eMWNOgLN1wGkxXUtzlwEM8FNJlliOliuXdj:Q1im2OhNuoYUVMKtliuh

    Score
    10/10
    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks