General

  • Target

    file.exe

  • Size

    2.8MB

  • Sample

    241031-j7tvmawlem

  • MD5

    52670e01e665662f6da1c51cba5dca02

  • SHA1

    a95f660d5f2668d6d6de5311758c64ff7a8fcee0

  • SHA256

    1a7de345f855aab705dbc8cf47fc7e1a364fb05c7a964f5fb33e6115066b1b58

  • SHA512

    2e746b9930b335ed0cf00f9ae3179ce506ef0b01b6a6384de017d246244c1e814d6ad4a28cc0b3745007358c2d47b6523aaf0aa2975cd33bd2bcfe03707fb785

  • SSDEEP

    49152:x9U8chYqgRKOEdCVBQUHqcyUJKopAKwP67:nUZhYRRKOICV7KcyalX267

Malware Config

Extracted

Family

lumma

C2

https://necklacedmny.store/api

https://founpiuer.store/api

https://navygenerayk.store/api

Targets

    • Target

      file.exe

    • Size

      2.8MB

    • MD5

      52670e01e665662f6da1c51cba5dca02

    • SHA1

      a95f660d5f2668d6d6de5311758c64ff7a8fcee0

    • SHA256

      1a7de345f855aab705dbc8cf47fc7e1a364fb05c7a964f5fb33e6115066b1b58

    • SHA512

      2e746b9930b335ed0cf00f9ae3179ce506ef0b01b6a6384de017d246244c1e814d6ad4a28cc0b3745007358c2d47b6523aaf0aa2975cd33bd2bcfe03707fb785

    • SSDEEP

      49152:x9U8chYqgRKOEdCVBQUHqcyUJKopAKwP67:nUZhYRRKOICV7KcyalX267

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks