General

  • Target

    fa42b11471a29d71b22301a625446d82635cd82ebac07b4e5194aac360413254

  • Size

    1.8MB

  • Sample

    241118-nsgzqsvhpg

  • MD5

    ec47517ea23e764fb80b8b51241da776

  • SHA1

    145f38f2e5c250eb4f290b1af46c6df61cc44495

  • SHA256

    fa42b11471a29d71b22301a625446d82635cd82ebac07b4e5194aac360413254

  • SHA512

    cff11f70d521fd2b01d3ea29c6e65a400605d42290aa90c79e1acfd94421df1372b6bc5ed02bacfde35f579b1c9679e5bd13a0158db1570770a521d4c6242235

  • SSDEEP

    49152:IckZUr9IFPyZ+Syi7uxeora00vEeCF3oBSsbi:FkZ16H7kezZvtCOS

Malware Config

Extracted

Family

lumma

C2

https://processhol.sbs/api

https://p10tgrace.sbs/api

https://peepburry828.sbs/api

https://3xp3cts1aim.sbs/api

https://p3ar11fter.sbs/api

Targets

    • Target

      fa42b11471a29d71b22301a625446d82635cd82ebac07b4e5194aac360413254

    • Size

      1.8MB

    • MD5

      ec47517ea23e764fb80b8b51241da776

    • SHA1

      145f38f2e5c250eb4f290b1af46c6df61cc44495

    • SHA256

      fa42b11471a29d71b22301a625446d82635cd82ebac07b4e5194aac360413254

    • SHA512

      cff11f70d521fd2b01d3ea29c6e65a400605d42290aa90c79e1acfd94421df1372b6bc5ed02bacfde35f579b1c9679e5bd13a0158db1570770a521d4c6242235

    • SSDEEP

      49152:IckZUr9IFPyZ+Syi7uxeora00vEeCF3oBSsbi:FkZ16H7kezZvtCOS

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks