General

  • Target

    f03ed99fec4a15c97e10ecc04e01f402e452e8c162930d6077f4d762690d0734

  • Size

    5.7MB

  • Sample

    240701-fthzeszhnn

  • MD5

    59c58fdafe6e2a4c7826c987f53aa5dc

  • SHA1

    5c72cdf8e33a4e77aff7145d85b3284dcc1356d6

  • SHA256

    f03ed99fec4a15c97e10ecc04e01f402e452e8c162930d6077f4d762690d0734

  • SHA512

    28258b42c6a008e55e37d1ffff4d1ed74f7a9c7268c4928aa9865de710ebe782ddc70215c82dd35f1d8dce8d5c817d499a99e7963d97f32a41e0f62a4c78fe7c

  • SSDEEP

    49152:KN9aR05e5WPlFcixvIgDOS1E50r8uvDVDd2xEeq85jV5EsF2KiOxZ9mICXxzhLzH:YoqlFPLDUuvZxAE2e1/

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://potterryisiw.shop/api

https://foodypannyjsud.shop/api

https://contintnetksows.shop/api

https://reinforcedirectorywd.shop/api

Targets

    • Target

      f03ed99fec4a15c97e10ecc04e01f402e452e8c162930d6077f4d762690d0734

    • Size

      5.7MB

    • MD5

      59c58fdafe6e2a4c7826c987f53aa5dc

    • SHA1

      5c72cdf8e33a4e77aff7145d85b3284dcc1356d6

    • SHA256

      f03ed99fec4a15c97e10ecc04e01f402e452e8c162930d6077f4d762690d0734

    • SHA512

      28258b42c6a008e55e37d1ffff4d1ed74f7a9c7268c4928aa9865de710ebe782ddc70215c82dd35f1d8dce8d5c817d499a99e7963d97f32a41e0f62a4c78fe7c

    • SSDEEP

      49152:KN9aR05e5WPlFcixvIgDOS1E50r8uvDVDd2xEeq85jV5EsF2KiOxZ9mICXxzhLzH:YoqlFPLDUuvZxAE2e1/

    Score
    10/10
    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks