General

  • Target

    lumma.exe

  • Size

    6.1MB

  • Sample

    230707-mptnpagd59

  • MD5

    5dbd662bf2a7fadeca6bbba5898bb8d4

  • SHA1

    44d889bb3410e9349f3b29db898570afed81e15f

  • SHA256

    6d01ffff31ad0cb763b02e84a7c859f4dc93fe7dd4de0ffc85be2b224ac274e0

  • SHA512

    a152b7e65d44d1d86de40a726db7e4bb3e5fd8bf09437f18e1f29103f410f856b0cd1522f3bd4f47d83d49f3d0d36204a94395df81cd8ff627a7cbd4bf3998a2

  • SSDEEP

    196608:yujq6slR93VL+8fpeBjXTUy6/hKsMmDk:yujFordeBnp6/4sMR

Malware Config

Targets

    • Target

      lumma.exe

    • Size

      6.1MB

    • MD5

      5dbd662bf2a7fadeca6bbba5898bb8d4

    • SHA1

      44d889bb3410e9349f3b29db898570afed81e15f

    • SHA256

      6d01ffff31ad0cb763b02e84a7c859f4dc93fe7dd4de0ffc85be2b224ac274e0

    • SHA512

      a152b7e65d44d1d86de40a726db7e4bb3e5fd8bf09437f18e1f29103f410f856b0cd1522f3bd4f47d83d49f3d0d36204a94395df81cd8ff627a7cbd4bf3998a2

    • SSDEEP

      196608:yujq6slR93VL+8fpeBjXTUy6/hKsMmDk:yujFordeBnp6/4sMR

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks