General

  • Target

    2c74960436b0ad3e564f0a0a3dc5fbc6dcfd167fa1409fbf5fe36a37af8027b3

  • Size

    7.2MB

  • Sample

    240924-jhkweszbrd

  • MD5

    a2b2178ff8d9e79623eb59ad897cb8ed

  • SHA1

    6e3d9d4174b4c32aede0940669b858e95e8ef835

  • SHA256

    2c74960436b0ad3e564f0a0a3dc5fbc6dcfd167fa1409fbf5fe36a37af8027b3

  • SHA512

    080fbb3645967515186aeb3d20e714bc7bb12f4f9a408826a299d30f96d347eea0ae840bf30dd3dd51580a23e26802dab29782b76c88eb191052f80f8b4616c0

  • SSDEEP

    98304:QsmhiMn1iZlNHePwSB2ptG4dOuHWw5QLXiQO3zneSJkvieklpIN47AtC486fa0FV:SNu7HePorG4775QLyDznrEzQ7l4nnV

Malware Config

Extracted

Family

cryptbot

C2

eihtvf18vs.top

analforeverlovyu.top

Attributes
  • url_path

    /v1/upload.php

Extracted

Family

lumma

C2

https://agreedmeanynj.shop/api

Targets

    • Target

      2c74960436b0ad3e564f0a0a3dc5fbc6dcfd167fa1409fbf5fe36a37af8027b3

    • Size

      7.2MB

    • MD5

      a2b2178ff8d9e79623eb59ad897cb8ed

    • SHA1

      6e3d9d4174b4c32aede0940669b858e95e8ef835

    • SHA256

      2c74960436b0ad3e564f0a0a3dc5fbc6dcfd167fa1409fbf5fe36a37af8027b3

    • SHA512

      080fbb3645967515186aeb3d20e714bc7bb12f4f9a408826a299d30f96d347eea0ae840bf30dd3dd51580a23e26802dab29782b76c88eb191052f80f8b4616c0

    • SSDEEP

      98304:QsmhiMn1iZlNHePwSB2ptG4dOuHWw5QLXiQO3zneSJkvieklpIN47AtC486fa0FV:SNu7HePorG4775QLyDznrEzQ7l4nnV

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks