General

  • Target

    !!SetUp_2244_PassW0rds$.rar

  • Size

    11.0MB

  • Sample

    240825-pp3mpswbrp

  • MD5

    9184f328f2ae2eef2e7d8cd2d30e2876

  • SHA1

    c3f8f11558219f9b7d749f5ed7c87ab1db5bdebb

  • SHA256

    fa157be2b242c587e27ad0ab592e9e2d9084d0964289d0abb05f2ef28a9984c6

  • SHA512

    e4ec3023e4ef320885901a7ff9287797af70067aaf9e513b43159149fd9520a639ee4a56c04215292b76e86c6496aa1d188e4dae1c935bf0625df3510d4ce24d

  • SSDEEP

    196608:E+rq1zmJ/Swklkdb18ilNbFmrDio5En3M0dmw0WK6n1aUFsAxfVvxftOLz9:E+rgCFklM8GSDf83MiWgoB2fVZft4B

Malware Config

Extracted

Family

lumma

C2

https://calcuatllitwop.shop/api

https://locatedblsoqp.shop/api

https://traineiwnqo.shop/api

https://condedqpwqm.shop/api

https://millyscroqwp.shop/api

https://stagedchheiqwo.shop/api

https://stamppreewntnq.shop/api

https://caffegclasiqwp.shop/api

https://tenntysjuxmz.shop/api

Targets

    • Target

      Setup.exe

    • Size

      8.5MB

    • MD5

      98169506fec94c2b12ba9930ad704515

    • SHA1

      bce662a9fb94551f648ba2d7e29659957fd6a428

    • SHA256

      9b8a5b0a45adf843e24214b46c285e44e73bc6eaf9e2a3b2c14a6d93ae541363

    • SHA512

      7f4f7ac2326a1a8b7afc72822dae328753578eb0a4ffcec5adb4e4fb0c49703070f71e7411df221ee9f44d6b43a0a94921fe530877c5d5e71640b807e96def30

    • SSDEEP

      196608:vdoUox8PFOegKz+qE1cnuyHgv3eZaOxqeXY4K:vC0O9m7EWEvbOxqetK

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks