General

  • Target

    bffa45175f7093d5693eb363ef76e88afe0944a324a5fcedc6e746a2eab39b07

  • Size

    7.2MB

  • Sample

    240801-ee43nszhkk

  • MD5

    9b16995cc10188cc620679e87dc37057

  • SHA1

    5a4025686fd0b79b569e5bdcfc1f3476cfa37937

  • SHA256

    bffa45175f7093d5693eb363ef76e88afe0944a324a5fcedc6e746a2eab39b07

  • SHA512

    ae0756c3ad1798f456390b32d85d70bd2874ff6f4cf12be86d47b875e5713738e97d4ea113a7c40cca81796ec4f5244540792b9b6c87492fa42b5f47767c5670

  • SSDEEP

    98304:DOzfSXDeDDtvFp7EwkWtA1bGdYNaYnqsO8u5yA09S:SSXDeVEwYqdYNaYnqsKm9S

Malware Config

Extracted

Family

lumma

C2

https://horizonvxjis.shop/api

https://effectivedoxzj.shop/api

https://parntorpkxzlp.shop/api

https://stimultaionsppzv.shop/api

https://grassytaisol.shop/api

https://broccoltisop.shop/api

https://shellfyyousdjz.shop/api

https://bravedreacisopm.shop/api

Extracted

Family

lumma

C2

https://horizonvxjis.shop/api

Targets

    • Target

      bffa45175f7093d5693eb363ef76e88afe0944a324a5fcedc6e746a2eab39b07

    • Size

      7.2MB

    • MD5

      9b16995cc10188cc620679e87dc37057

    • SHA1

      5a4025686fd0b79b569e5bdcfc1f3476cfa37937

    • SHA256

      bffa45175f7093d5693eb363ef76e88afe0944a324a5fcedc6e746a2eab39b07

    • SHA512

      ae0756c3ad1798f456390b32d85d70bd2874ff6f4cf12be86d47b875e5713738e97d4ea113a7c40cca81796ec4f5244540792b9b6c87492fa42b5f47767c5670

    • SSDEEP

      98304:DOzfSXDeDDtvFp7EwkWtA1bGdYNaYnqsO8u5yA09S:SSXDeVEwYqdYNaYnqsKm9S

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks