General

  • Target

    https://download2277.mediafire.com/668eia3oc3cg6fbQZxsZd9OrX8kRmitMxLc3jP9xRUTAF8ArxaTRZt4MIhzWNg_5dBhI_0fFYnqInpVBqhBJdcIQLqbdcT4l3C0vIZ4g1LoZUpmAOWr9Yj7fJqkJNrSJdiNNNIfEN1Eq_ROhH6PxSOgeC-P5YuJkQUFYRY_UoJg/nm2kx4oywhfnwr2/ClientTaxq.rar

  • Sample

    240802-trm29awama

Malware Config

Extracted

Family

lumma

C2

https://violanntyisopz.shop/api

https://applyzxcksdia.shop/api

https://replacedoxcjzp.shop/api

https://declaredczxi.shop/api

https://catchddkxozvp.shop/api

https://arriveoxpzxo.shop/api

https://contemplateodszsv.shop/api

https://bindceasdiwozx.shop/api

https://conformfucdioz.shop/api

Extracted

Family

lumma

C2

https://violanntyisopz.shop/api

https://tenntysjuxmz.shop/api

Targets

    • Target

      https://download2277.mediafire.com/668eia3oc3cg6fbQZxsZd9OrX8kRmitMxLc3jP9xRUTAF8ArxaTRZt4MIhzWNg_5dBhI_0fFYnqInpVBqhBJdcIQLqbdcT4l3C0vIZ4g1LoZUpmAOWr9Yj7fJqkJNrSJdiNNNIfEN1Eq_ROhH6PxSOgeC-P5YuJkQUFYRY_UoJg/nm2kx4oywhfnwr2/ClientTaxq.rar

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks