General

  • Target

    PotentialLummaC2Cinfected.zip

  • Size

    24.5MB

  • Sample

    241101-j4njfazqak

  • MD5

    9e5157cbb3ad6e7d5136213da77ce13b

  • SHA1

    abe195d97807b8dbb15c182b60b6a5209112e1b9

  • SHA256

    0e6fc77a72dd0b4c8f8fe7607c92eac7cf5b0d607c9904e09d9fb1b2128a2e51

  • SHA512

    dc409bd9965d18995ace55b5aee00b0a1fb82ace63a670dac93c23ba3c03c8f1050d92a35a440fd5eece625fce4eabb03e32568cbb29c274705d8604bc4f514c

  • SSDEEP

    786432:d4A2cr6DZVRtmN8eVLQ1ib1/HjniGRGevZe5L:dCo61rtWRFh/HLiGRjC

Malware Config

Extracted

Family

stealc

Botnet

7140196255

C2

http://83.217.209.11

Attributes
  • url_path

    /fd2453cf4b7dd4a4.php

Extracted

Family

quasar

Version

1.4.0.0

Botnet

Office

C2

82.117.243.110:5173

Mutex

edH11NGQWIdCwvLx00

Attributes
  • encryption_key

    aGPuRaDerdUDJPrAfXtB

  • install_name

    csrss.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Framework

  • subdirectory

    SubDir

Extracted

Family

vidar

C2

https://t.me/asg7rd

https://steamcommunity.com/profiles/76561199794498376

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6

Extracted

Family

lumma

C2

https://goalyfeastz.site/api

https://contemteny.site/api

https://dilemmadu.site/api

https://authorisev.site/api

https://navygenerayk.store/api

https://necklacedmny.store/api

https://founpiuer.store/api

Targets

    • Target

      -pril-main/dwthjadth.exe

    • Size

      1.2MB

    • MD5

      0d7c313b85166c863035ad3ec18c6e4f

    • SHA1

      37707f9bf2e4125aeb25723417645d27b6196f70

    • SHA256

      88a65937fdd2aabdee1cbf35c91c68f42ff2781dcc1683f47a76bf22369d8b99

    • SHA512

      06bf4da4b84da41494eb3a5d2d233fad46d17998150fd2141e2fea97d35ca5b1e5def47e6736d5b3ffcafa4c31b1288ad6343f4166c04d7b17f86485590540bc

    • SSDEEP

      24576:+MHoh+68XmR4ftxOYM7kyMVqfScf/hFkz28OAo4DV75KJeYE:+go860htxOYMx+qa6SzW/uV75bB

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      -pril-main/feuiyjjdaw.exe

    • Size

      1.2MB

    • MD5

      bbdf2348280d48f42e73698286a12ca9

    • SHA1

      c81c885ec8b2699e0d0f575f412ceaab19d449f0

    • SHA256

      378fa3b7ca6692130a3f6612c1fcb8e383c3ae032274d26f89aa49662b88a9dd

    • SHA512

      82213d3748a278cab7e1db73ba9572bf09743af5c42f45be94b78f6a7ed7d4f40248eec89e659976e2b2e2490c21dd2c69bb08caf230cffa02cde7930847b365

    • SSDEEP

      24576:ZrmKiW3vM+VVSvan2oq0XtdFp/0+YxA7iR6VjtEtp0Ky9EV:dVvSin2o9XHE+YKVhp

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      -pril-main/kldrgawdtjawd.exe

    • Size

      415KB

    • MD5

      c7b0cb9208e2b95e4feb6b741ff1d84c

    • SHA1

      5d7446910dbbdca73e8b54657effbe4bca26c848

    • SHA256

      686b2be963226d6ce410599e55e87854d8ccbcaf323fed1cfc8120a16880b712

    • SHA512

      7d9ebee121b5191a3b7e5cd51661a47db6d396c1dd5f38b9fa12cb222e3508db9ef31bdbfc7fbbcbdd0011e0d8cb6da8c2c4091ad94497cd62f6ad7675fe7681

    • SSDEEP

      12288:x1kr8FfCb2FwUv8ONiweKY+eCszyL4f3a:LkrKfC6wUv8ONiwGN/

    Score
    7/10
    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Target

      -pril-main/pothjadwtrgh.exe

    • Size

      868KB

    • MD5

      ca5762b75aecc07225105e53f65b8802

    • SHA1

      9abd37e3eda743422a7240ed8caacc0ab12ec7d7

    • SHA256

      f7182909f0bf61829d5fab95d5211e8b21e186247a5265d6cae1cacc77eca0fb

    • SHA512

      a36b9512b772b51e926e42e32d78510cf585ecac7ff19fce0de8f692e00b5394de3ff209b0c06bdc99e36c723cac8a73e0ad02363119484a944d3c246a430e90

    • SSDEEP

      24576:maIXlg5MGNL/geFyNcTN+jv75TQn652VBuNyb:zIXlgiGJtF4ch+jvNm0Nyb

    • Target

      -pril-main/ptjjsekfthse.exe

    • Size

      631KB

    • MD5

      4d95ea8721d0a84b69c2d60951a8a65e

    • SHA1

      b3b9230b284c32e8d35c65b6b31d0a1b729c6d7c

    • SHA256

      1aeaabc57a89dd8508a5e997236b91b3cd7e584dad94700fcad9d8637d2b926d

    • SHA512

      7500b73aa452a6452fd6fe41df0fbffa96821918df34fcff2a29bf2072f5fdb02886fa0945f5d567fefcf30de6d042b4e17e6760bb5e5a3ceba11767316c3fee

    • SSDEEP

      12288:Cr2N7ewZcHjHkoP19jpVgUbdxGU2NjCa8UQGqIJ7uHXNI8W2Zx:Cr2EEypVg4x8NmtjS+

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Target

      -pril-main/thadkythjawed.exe

    • Size

      1.2MB

    • MD5

      69d72f6f5c7d8e466e4508debf3c25ce

    • SHA1

      323adedde44004b5b2756484523f6d42fcf19169

    • SHA256

      b01136e7edb6f8a6216fcbc97064ecff3c2e3139dd89f2c309fbe4cc7c42592f

    • SHA512

      fc98f9f9ea603ecc3aee9fe7a81dea8a770ac11090b8eba3d147974fb6ab0dd341fa91b9bf1d634ed39006e08c9911df53ce8a80cfc16ce6153eb359eeb83215

    • SSDEEP

      24576:KCr82vV+b9bKcfS1xritdLiFZS0M2z9y4LHRgaEy2T2lHIishkMhSf:KCrBqTfSLrifCS0Zy4zKavblBs5I

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      Installer/Accord.dll

    • Size

      128KB

    • MD5

      462500956d2d63725fb60c83516cec35

    • SHA1

      2d6326cb19d88bfdaa84112b6ff0259ec72d60f4

    • SHA256

      d36c225a84415c01bc2a8e84096590a7206dfc3d36173e3c7b6a62a04c0a33a9

    • SHA512

      10b1c3fcdd21464bb6f1aee796171237dc3f0763b1a6b8b41a2410aa264047fc8e256588a06ae141905b78e9a85414797b22ecb73c2a9fca150b81f63efdde46

    • SSDEEP

      1536:+x8piUO4o++aIRYMUVptbFoSycwX6xIp4EB7zujXe4HvFIdtdUlIAq:+x8piUO5aIRtUVTFl86PEB7yFdIdY6F

    Score
    1/10
    • Target

      Installer/CapCut.exe

    • Size

      332KB

    • MD5

      9095698e073c305cb31934f911e2f224

    • SHA1

      3c3a7cf49ecc1faf01d8f85d345425a3c417361e

    • SHA256

      a274bbefeca015c06188faf15493b32f3ed4b175a92fa4fdf59a0da55059f6db

    • SHA512

      8470d517a74c721911b7a5b93a8513630a9cfef747ef143296bfdcb3174620ddec7d2e170afbed2621f441aaa663b46eec676c9e8065b9fde87bf15633190fb6

    • SSDEEP

      6144:KurqFF99YI+Ka804ozhmKuRb5B/OalLbQg1/R:YFFXY9vrzoKud59Oahbv

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      Installer/Tools/Accord.3.8.0/lib/net35-unity full v3.5/Accord.dll

    • Size

      148KB

    • MD5

      e155917f082b3d7754937f1c8a378209

    • SHA1

      f7793aa262439ab98323dd9a76988608cb3d6105

    • SHA256

      4e9838f1e2d120ed2297bab01042c5d947506fbf4a96e330528cc5bcf8960da0

    • SHA512

      3848a4048a9e443239064129747c9f449d149dd8400b6a76362d4fd69e84bc9baba85c2600c5adfaa5ba3cfe224d77e2166557cb4ffcdcaea822481d57658cd8

    • SSDEEP

      3072:G+cdP98cPVdSvw4PDFiQezKm2sTqVJtPWdGLSJhfZETCvT4H:G+cdP98cP+4kLezKm2sgnPWoLmRZETCU

    Score
    1/10
    • Target

      Installer/Tools/Accord.3.8.0/lib/net35-unity micro v3.5/Accord.dll

    • Size

      148KB

    • MD5

      e155917f082b3d7754937f1c8a378209

    • SHA1

      f7793aa262439ab98323dd9a76988608cb3d6105

    • SHA256

      4e9838f1e2d120ed2297bab01042c5d947506fbf4a96e330528cc5bcf8960da0

    • SHA512

      3848a4048a9e443239064129747c9f449d149dd8400b6a76362d4fd69e84bc9baba85c2600c5adfaa5ba3cfe224d77e2166557cb4ffcdcaea822481d57658cd8

    • SSDEEP

      3072:G+cdP98cPVdSvw4PDFiQezKm2sTqVJtPWdGLSJhfZETCvT4H:G+cdP98cP+4kLezKm2sgnPWoLmRZETCU

    Score
    1/10
    • Target

      Installer/Tools/Accord.3.8.0/lib/net35-unity subset v3.5/Accord.dll

    • Size

      148KB

    • MD5

      e155917f082b3d7754937f1c8a378209

    • SHA1

      f7793aa262439ab98323dd9a76988608cb3d6105

    • SHA256

      4e9838f1e2d120ed2297bab01042c5d947506fbf4a96e330528cc5bcf8960da0

    • SHA512

      3848a4048a9e443239064129747c9f449d149dd8400b6a76362d4fd69e84bc9baba85c2600c5adfaa5ba3cfe224d77e2166557cb4ffcdcaea822481d57658cd8

    • SSDEEP

      3072:G+cdP98cPVdSvw4PDFiQezKm2sTqVJtPWdGLSJhfZETCvT4H:G+cdP98cP+4kLezKm2sgnPWoLmRZETCU

    Score
    1/10
    • Target

      Installer/Tools/Accord.3.8.0/lib/net35-unity web v3.5/Accord.dll

    • Size

      148KB

    • MD5

      e155917f082b3d7754937f1c8a378209

    • SHA1

      f7793aa262439ab98323dd9a76988608cb3d6105

    • SHA256

      4e9838f1e2d120ed2297bab01042c5d947506fbf4a96e330528cc5bcf8960da0

    • SHA512

      3848a4048a9e443239064129747c9f449d149dd8400b6a76362d4fd69e84bc9baba85c2600c5adfaa5ba3cfe224d77e2166557cb4ffcdcaea822481d57658cd8

    • SSDEEP

      3072:G+cdP98cPVdSvw4PDFiQezKm2sTqVJtPWdGLSJhfZETCvT4H:G+cdP98cP+4kLezKm2sgnPWoLmRZETCU

    Score
    1/10
    • Target

      Installer/Tools/Accord.3.8.0/lib/net35/Accord.dll

    • Size

      148KB

    • MD5

      e155917f082b3d7754937f1c8a378209

    • SHA1

      f7793aa262439ab98323dd9a76988608cb3d6105

    • SHA256

      4e9838f1e2d120ed2297bab01042c5d947506fbf4a96e330528cc5bcf8960da0

    • SHA512

      3848a4048a9e443239064129747c9f449d149dd8400b6a76362d4fd69e84bc9baba85c2600c5adfaa5ba3cfe224d77e2166557cb4ffcdcaea822481d57658cd8

    • SSDEEP

      3072:G+cdP98cPVdSvw4PDFiQezKm2sTqVJtPWdGLSJhfZETCvT4H:G+cdP98cP+4kLezKm2sgnPWoLmRZETCU

    Score
    1/10
    • Target

      Installer/Tools/Accord.3.8.0/lib/net40/Accord.dll

    • Size

      128KB

    • MD5

      7973f3ff5b1d9128ca66658576560819

    • SHA1

      d3bea89f8c3037a4faadf3b399d501bcc3798cd6

    • SHA256

      24e35568c79531d41330439a59ef5e2cd2e55bb87e0428daef37d9aa11ab432a

    • SHA512

      e283ab910f936ac852d659d18d1ee9a6829ceaf9353a14572f43efabd34e60beef5f29f937aa6ad4e146b3c875c59bd9acb10230c9543529f08b70251204d728

    • SSDEEP

      3072:ozUHt2atsOWiUcHCrltiud10RrqTEBlbX4YFDiT:ozUHRtsOWv5EgEvr4o

    Score
    1/10
    • Target

      Installer/Tools/Accord.3.8.0/lib/net45/Accord.dll

    • Size

      128KB

    • MD5

      585e55a96f52a550c6a6ec7859996b6e

    • SHA1

      07f6112f3380eee1f349732b890a7757e9018fca

    • SHA256

      67a1977a211dd33752c7e6fcafb1e6ab61b6f26f529b1373e54d1ca512ada858

    • SHA512

      92f8b38f50c3b84fa8558b68bed62891bb508ac208a500cf18fb586e12adc37a70f3a7ee71d7a656be188b0ab3eedbd944313dcab5e7d0c06f543c98331d40dc

    • SSDEEP

      1536:288phvO4o++aI12Mo4BOtbF4kDDV2LYWm2aIp4EBVJo7Je4Hjs1IdtdUCIw7:288phvO5aI12Mo4EF/JEBSJFDiIdYdm

    Score
    1/10
    • Target

      Installer/Tools/Accord.3.8.0/lib/net46/Accord.dll

    • Size

      128KB

    • MD5

      c988f0203059a8017533d086718ae3a9

    • SHA1

      861c257a172625436305d1ebf6205bae2f695d9b

    • SHA256

      b8eba126ccbe1e641b062fa1a4f45d094519bd5bc6ea81a4a24d4c2e549e883f

    • SHA512

      60c85cb06c60850fbe883802b52268611dea94be9cdbb9d168c7f800e51184e41243e9b0e0b4d9e31ad94160948d2590bf82e3759bc5235d722a9326829cacd1

    • SSDEEP

      1536:ox8piUO4o++aIRYMUVpJbFoSycwX6xIp4EB7zuPfe4HvFIdtdUJIA5:ox8piUO5aIRtUVXFl86PEB72FdIdYGm

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks

static1

7140196255ratofficestealerstealcdcratquasarvidarasyncratstormkittyvenomrat
Score
10/10

behavioral1

lummadiscoverystealer
Score
10/10

behavioral2

lummadiscoverystealer
Score
10/10

behavioral3

lummadiscoverystealer
Score
10/10

behavioral4

lummadiscoverystealer
Score
10/10

behavioral5

spywarestealer
Score
7/10

behavioral6

spywarestealer
Score
7/10

behavioral7

stealc7140196255discoverystealer
Score
10/10

behavioral8

stealc7140196255discoverystealer
Score
10/10

behavioral9

dcratinfostealerpersistenceratspywarestealer
Score
10/10

behavioral10

dcratinfostealerpersistenceratspywarestealer
Score
10/10

behavioral11

lummadiscoverystealer
Score
10/10

behavioral12

lummadiscoverystealer
Score
10/10

behavioral13

Score
1/10

behavioral14

Score
1/10

behavioral15

execution
Score
8/10

behavioral16

lummadiscoveryexecutionstealer
Score
10/10

behavioral17

Score
1/10

behavioral18

Score
1/10

behavioral19

Score
1/10

behavioral20

Score
1/10

behavioral21

Score
1/10

behavioral22

Score
1/10

behavioral23

Score
1/10

behavioral24

Score
1/10

behavioral25

Score
1/10

behavioral26

Score
1/10

behavioral27

Score
1/10

behavioral28

Score
1/10

behavioral29

Score
1/10

behavioral30

Score
1/10

behavioral31

Score
1/10

behavioral32

Score
1/10