General

  • Target

    Hydra.EXE

  • Size

    3.7MB

  • Sample

    240914-pq1jqsthnh

  • MD5

    79250696b412b3acd36a9e1b1d7f4db1

  • SHA1

    158ad1ab19323ce8999352d9f014057e6d8869cf

  • SHA256

    ecbbe3b48575f2c2476e2f5b2f94668ed072503e6d0038b50372ac2ff613a27c

  • SHA512

    c40dae620cd7e2572fa270f6d28747668bf6e3d70fd826b9a7cd74a3313026ddbfd0a8498efc72c034bc020a3c41b6729740a50cf4611f90bad2e408d4e81cda

  • SSDEEP

    98304:pxHCOQ6fkzgneNNNNAlPB5RD2Ju/pnlnYJGs0d50UMcB7U:LiTgne2BH2JcpnJs0T0UR

Malware Config

Extracted

Family

lumma

C2

https://writerospzm.shop/api

Targets

    • Target

      Hydra.EXE

    • Size

      3.7MB

    • MD5

      79250696b412b3acd36a9e1b1d7f4db1

    • SHA1

      158ad1ab19323ce8999352d9f014057e6d8869cf

    • SHA256

      ecbbe3b48575f2c2476e2f5b2f94668ed072503e6d0038b50372ac2ff613a27c

    • SHA512

      c40dae620cd7e2572fa270f6d28747668bf6e3d70fd826b9a7cd74a3313026ddbfd0a8498efc72c034bc020a3c41b6729740a50cf4611f90bad2e408d4e81cda

    • SSDEEP

      98304:pxHCOQ6fkzgneNNNNAlPB5RD2Ju/pnlnYJGs0d50UMcB7U:LiTgne2BH2JcpnJs0T0UR

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks