General

  • Target

    154d2e053cee0ed49fc0ba1e10c959e9.bin

  • Size

    4.1MB

  • Sample

    240801-bgp5raxhke

  • MD5

    8c13ae3a866337690339cb37ca48046d

  • SHA1

    eb33ac621b140e1990c3530bd2ae41af14de5e9e

  • SHA256

    ea9878735a3468e98f686a20c82a801d59e96a3b3b1906a932348f4dd4087adf

  • SHA512

    8185cfe2e597740bbb4e406444381ef1d87cd53742eb45eddae6c4ced617ff78c53f03fd6f6b95c72983b9089319031a6579e5332257f063f5f845fd026be8b3

  • SSDEEP

    98304:DPvd+7Wu8PYXRU0fSRNHt3ez+/b8gVsWy8DqkhkadpC2+YF1OGOPQ:jd+Cu8k5+N0z3zqqklpC2ZoGOY

Malware Config

Extracted

Family

lumma

C2

https://disappearsodsz.shop/api

https://horizonvxjis.shop/api

https://effectivedoxzj.shop/api

https://parntorpkxzlp.shop/api

https://stimultaionsppzv.shop/api

https://grassytaisol.shop/api

https://broccoltisop.shop/api

https://shellfyyousdjz.shop/api

https://bravedreacisopm.shop/api

Extracted

Family

lumma

C2

https://disappearsodsz.shop/api

https://horizonvxjis.shop/api

Targets

    • Target

      01b9f4c8f12c216dc74fadbadca2994405b7fb20cac24889b06e2281b71cbe22.exe

    • Size

      7.2MB

    • MD5

      154d2e053cee0ed49fc0ba1e10c959e9

    • SHA1

      5c3d4c3f5705341accefd661b049c6cdc68696a9

    • SHA256

      01b9f4c8f12c216dc74fadbadca2994405b7fb20cac24889b06e2281b71cbe22

    • SHA512

      678726ac3c77ecab84af0a6a9b6205a2dcc8f854e4818946cf4fee470fe2a74c5de82df7168eb5ff698a5fefd8d758120597717f3f1628d86d732344fdc90a42

    • SSDEEP

      98304:RnSh6IcCF7ZToDEHeTtjtmX2ZnqmGkpE9:RdCF7ZtHWjVqvJ

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks