General

  • Target

    880807d4fec91e5e49dfe8dae955a3f54a260ba185534cd3460718f03d96d2ad.exe

  • Size

    1.8MB

  • Sample

    241014-ntzaeavake

  • MD5

    7cf6ca7aa32a2c99dd2e98402c9378a1

  • SHA1

    bbed49554b5dbda459820b76c59ea21592a81f66

  • SHA256

    880807d4fec91e5e49dfe8dae955a3f54a260ba185534cd3460718f03d96d2ad

  • SHA512

    c6199ca37869b7a112b120247f8e87d3d3c7cdff3eccea9134db2fd18c46d0fdf6035e8cdcd047a20c6ad6f1339b9b751986213c4fdb8eadbbb387521e4df8c2

  • SSDEEP

    49152:0EZvdcnYiFX8TFaxosPT/a9Vne2B3Q8DW+90K7:J1crFXwFaxPb/a9dDJ4+GS

Malware Config

Extracted

Family

lumma

C2

https://clearancek.site

https://licendfilteo.site

https://spirittunek.store

https://bathdoomgaz.store

https://studennotediw.store

https://dissapoiznw.store

https://eaglepawnoy.store

https://mobbipenju.store

Targets

    • Target

      880807d4fec91e5e49dfe8dae955a3f54a260ba185534cd3460718f03d96d2ad.exe

    • Size

      1.8MB

    • MD5

      7cf6ca7aa32a2c99dd2e98402c9378a1

    • SHA1

      bbed49554b5dbda459820b76c59ea21592a81f66

    • SHA256

      880807d4fec91e5e49dfe8dae955a3f54a260ba185534cd3460718f03d96d2ad

    • SHA512

      c6199ca37869b7a112b120247f8e87d3d3c7cdff3eccea9134db2fd18c46d0fdf6035e8cdcd047a20c6ad6f1339b9b751986213c4fdb8eadbbb387521e4df8c2

    • SSDEEP

      49152:0EZvdcnYiFX8TFaxosPT/a9Vne2B3Q8DW+90K7:J1crFXwFaxPb/a9dDJ4+GS

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks