General

  • Target

    7fcec3f5f2584788391ad8de7bb93b3d3f2833b0e181057e9eb3051d8e9e1c44.exe

  • Size

    2.8MB

  • Sample

    241102-gzrdeszgrj

  • MD5

    343a031e57648c45d10f16fbb153e47a

  • SHA1

    9724cdf4636f15541a0cbb7b401e7c5482edafa2

  • SHA256

    7fcec3f5f2584788391ad8de7bb93b3d3f2833b0e181057e9eb3051d8e9e1c44

  • SHA512

    d78d2457e4a799c1042394939c36cce304a332c2e354977b6a366923e98f6aca2b7270ca1aaf0b4195ef8094837f1fd832b02bcb7d0a5f1f0b75cf7939a815a6

  • SSDEEP

    49152:+hG5ErNrkbljL3tD+/KvuJG/3b5Iw0yJ:+hG5E5kZjL9C/KGJG/6L

Malware Config

Extracted

Family

lumma

C2

https://necklacedmny.store/api

https://founpiuer.store/api

https://navygenerayk.store/api

Targets

    • Target

      7fcec3f5f2584788391ad8de7bb93b3d3f2833b0e181057e9eb3051d8e9e1c44.exe

    • Size

      2.8MB

    • MD5

      343a031e57648c45d10f16fbb153e47a

    • SHA1

      9724cdf4636f15541a0cbb7b401e7c5482edafa2

    • SHA256

      7fcec3f5f2584788391ad8de7bb93b3d3f2833b0e181057e9eb3051d8e9e1c44

    • SHA512

      d78d2457e4a799c1042394939c36cce304a332c2e354977b6a366923e98f6aca2b7270ca1aaf0b4195ef8094837f1fd832b02bcb7d0a5f1f0b75cf7939a815a6

    • SSDEEP

      49152:+hG5ErNrkbljL3tD+/KvuJG/3b5Iw0yJ:+hG5E5kZjL9C/KGJG/6L

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks