General

  • Target

    39115365dc9527d2c2217f2ce5ad1535e8d70f29858315b68dfa090d1fcabe3b

  • Size

    940KB

  • Sample

    240703-zeeg8swerr

  • MD5

    423db0db0be1538dc13409dc9cdbdc2a

  • SHA1

    2c822354971c430ddad7917043117759d22fabcb

  • SHA256

    39115365dc9527d2c2217f2ce5ad1535e8d70f29858315b68dfa090d1fcabe3b

  • SHA512

    550ce9e2773ad855acd772bd1559b2e54cd610ca0601b71dfe881c7e15d251fc688aeba1677839d50b12af357f3283b7f8126e434b35d80cf0bbfd4230b51ea1

  • SSDEEP

    24576:HkK/dQCtwyw2RijMs0r734C5jUZpRlDxqofV:xwyw2RijJLgjUZxbd

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://extorteauhhwigw.shop/api

https://potterryisiw.shop/api

https://foodypannyjsud.shop/api

https://contintnetksows.shop/api

https://reinforcedirectorywd.shop/api

Targets

    • Target

      39115365dc9527d2c2217f2ce5ad1535e8d70f29858315b68dfa090d1fcabe3b

    • Size

      940KB

    • MD5

      423db0db0be1538dc13409dc9cdbdc2a

    • SHA1

      2c822354971c430ddad7917043117759d22fabcb

    • SHA256

      39115365dc9527d2c2217f2ce5ad1535e8d70f29858315b68dfa090d1fcabe3b

    • SHA512

      550ce9e2773ad855acd772bd1559b2e54cd610ca0601b71dfe881c7e15d251fc688aeba1677839d50b12af357f3283b7f8126e434b35d80cf0bbfd4230b51ea1

    • SSDEEP

      24576:HkK/dQCtwyw2RijMs0r734C5jUZpRlDxqofV:xwyw2RijJLgjUZxbd

    Score
    10/10
    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks