Resubmissions

04/10/2024, 00:45 UTC

241004-a36h7avgkl 10

03/10/2024, 22:30 UTC

241003-2eyl8azfqj 6

General

  • Target

    04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a

  • Size

    1.9MB

  • Sample

    241004-a36h7avgkl

  • MD5

    a00b2cfa83db42323e19d954710c74e1

  • SHA1

    d24e3546f6b758d64c86e7ac48f422ed97ea729a

  • SHA256

    04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a

  • SHA512

    cd3d85d24ef07771df20218e7e8743777156151436e58c029a3c89f804c3bbb477dc18fed67f1f5e97d3c5c31522fb673a1a109e47859f683ed7cc600067ec6a

  • SSDEEP

    49152:qvnMlvvvqFI3rUUan7yeCz3i96K0nLAcR3YmPXHXcK:64vWI3rJa7yeCzjDnUcRImPXHr

Malware Config

Extracted

Family

lumma

C2

https://beearvagueo.site/api

Targets

    • Target

      04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a

    • Size

      1.9MB

    • MD5

      a00b2cfa83db42323e19d954710c74e1

    • SHA1

      d24e3546f6b758d64c86e7ac48f422ed97ea729a

    • SHA256

      04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a

    • SHA512

      cd3d85d24ef07771df20218e7e8743777156151436e58c029a3c89f804c3bbb477dc18fed67f1f5e97d3c5c31522fb673a1a109e47859f683ed7cc600067ec6a

    • SSDEEP

      49152:qvnMlvvvqFI3rUUan7yeCz3i96K0nLAcR3YmPXHXcK:64vWI3rJa7yeCzjDnUcRImPXHr

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Modifies Windows Defender Real-time Protection settings

    • Windows security bypass

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Indirect Command Execution

      Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.