General

  • Target

    842e6467d3f6bddb484929a8dba9757920e0b484d8addf40a8fe69f8b205f174.exe

  • Size

    7.0MB

  • Sample

    240704-b4s5xsxfpp

  • MD5

    f308be1162c86c3d72ad06c4c85a67d4

  • SHA1

    c09e56bde09f752265d8527dd930715ce8e149e2

  • SHA256

    842e6467d3f6bddb484929a8dba9757920e0b484d8addf40a8fe69f8b205f174

  • SHA512

    801d273afcf3994c0b02466e3d5343cbb5ec6665abaf5b9a6e4e376e39e0dec6b572d9b7760f53842e6a65c6314567c85fea9a41833a8c29ed3b0c5d57c1108a

  • SSDEEP

    49152:EfMhc7XOayJj55BNcU0KA///skFyE6OjBuXVBw5yyk0+fNH4YxVjM5EmOj1Ggdap:Osc7XL4JNgB01XVKkuFEmBhIGFH

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://potterryisiw.shop/api

https://foodypannyjsud.shop/api

https://contintnetksows.shop/api

https://reinforcedirectorywd.shop/api

Targets

    • Target

      842e6467d3f6bddb484929a8dba9757920e0b484d8addf40a8fe69f8b205f174.exe

    • Size

      7.0MB

    • MD5

      f308be1162c86c3d72ad06c4c85a67d4

    • SHA1

      c09e56bde09f752265d8527dd930715ce8e149e2

    • SHA256

      842e6467d3f6bddb484929a8dba9757920e0b484d8addf40a8fe69f8b205f174

    • SHA512

      801d273afcf3994c0b02466e3d5343cbb5ec6665abaf5b9a6e4e376e39e0dec6b572d9b7760f53842e6a65c6314567c85fea9a41833a8c29ed3b0c5d57c1108a

    • SSDEEP

      49152:EfMhc7XOayJj55BNcU0KA///skFyE6OjBuXVBw5yyk0+fNH4YxVjM5EmOj1Ggdap:Osc7XL4JNgB01XVKkuFEmBhIGFH

    Score
    10/10
    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks