Resubmissions

27/07/2024, 15:17

240727-sn5bpaycnf 10

27/07/2024, 15:03

240727-se5k4avdpm 10

27/07/2024, 14:34

240727-rxyd3atfjl 10

General

  • Target

    ~!!SetUp_KEY_9696_PAas$c0De!%!!.zip

  • Size

    3.1MB

  • Sample

    240727-se5k4avdpm

  • MD5

    eade8ec3fb15be090a784517edac94cd

  • SHA1

    8c30ab460a1e60efbaa94bc2123ba756678b6dd5

  • SHA256

    910ec7d764e93e5ffd27e4b623c445e1ab2b66efdd962aebb7f6913a21f3e030

  • SHA512

    92a9ecc566e84172fc38742c0f73f9b9f1b9cd63db1910da82e529f1c61bec357e76746fc01938b64fd8bcbd93cc49cb56c13a04520f4b373f1abe6f942a5e00

  • SSDEEP

    49152:DWFfIQoUex85paSmkQmzfQ/x54yi53m+N/7Lv7dqmWgRhsfscmYR95FE4bYg85nY:DAfIQde0Zzxyi53NpgmWHfs1YRv8sHJ

Malware Config

Extracted

Family

lumma

C2

https://markerryshewi.shop/api

https://horizonvxjis.shop/api

https://effectivedoxzj.shop/api

https://parntorpkxzlp.shop/api

https://stimultaionsppzv.shop/api

https://grassytaisol.shop/api

https://broccoltisop.shop/api

https://shellfyyousdjz.shop/api

https://bravedreacisopm.shop/api

Extracted

Family

lumma

C2

https://markerryshewi.shop/api

https://horizonvxjis.shop/api

https://effectivedoxzj.shop/api

https://parntorpkxzlp.shop/api

https://stimultaionsppzv.shop/api

https://grassytaisol.shop/api

https://broccoltisop.shop/api

https://shellfyyousdjz.shop/api

https://bravedreacisopm.shop/api

Targets

    • Target

      ~!!SetUp_KEY_9696_PAas$c0De!%!!.zip

    • Size

      3.1MB

    • MD5

      eade8ec3fb15be090a784517edac94cd

    • SHA1

      8c30ab460a1e60efbaa94bc2123ba756678b6dd5

    • SHA256

      910ec7d764e93e5ffd27e4b623c445e1ab2b66efdd962aebb7f6913a21f3e030

    • SHA512

      92a9ecc566e84172fc38742c0f73f9b9f1b9cd63db1910da82e529f1c61bec357e76746fc01938b64fd8bcbd93cc49cb56c13a04520f4b373f1abe6f942a5e00

    • SSDEEP

      49152:DWFfIQoUex85paSmkQmzfQ/x54yi53m+N/7Lv7dqmWgRhsfscmYR95FE4bYg85nY:DAfIQde0Zzxyi53NpgmWHfs1YRv8sHJ

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Executes dropped EXE

    • Loads dropped DLL

    • System Binary Proxy Execution: Verclsid

      Adversaries may abuse Verclsid to proxy execution of malicious code.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks