General

  • Target

    e3bddf483a9abcd5df07b13cb6007c030a0467c85876d58aa9ab52dd2e2583c3

  • Size

    1.8MB

  • Sample

    241118-rfa77sxhmb

  • MD5

    0a8eeec9b77d4d4ea4e987ef55ff8295

  • SHA1

    d570b90b86f0d64efdd577a7140c9a54407fbd6b

  • SHA256

    e3bddf483a9abcd5df07b13cb6007c030a0467c85876d58aa9ab52dd2e2583c3

  • SHA512

    3c078b58865d17a9090771c05cb186537eb8ee694de386c6b39079bf13482ead794944759ef42ba428dc60f4625eb7497509966ff10a9768a67829d9ee045aab

  • SSDEEP

    49152:GBWplUwrcROROYc6S6nnc7rtu9nL6rClAE2buJ:DPcIROYcictu1L54

Malware Config

Extracted

Family

lumma

C2

https://processhol.sbs/api

https://p10tgrace.sbs/api

https://peepburry828.sbs/api

https://3xp3cts1aim.sbs/api

https://p3ar11fter.sbs/api

Targets

    • Target

      e3bddf483a9abcd5df07b13cb6007c030a0467c85876d58aa9ab52dd2e2583c3

    • Size

      1.8MB

    • MD5

      0a8eeec9b77d4d4ea4e987ef55ff8295

    • SHA1

      d570b90b86f0d64efdd577a7140c9a54407fbd6b

    • SHA256

      e3bddf483a9abcd5df07b13cb6007c030a0467c85876d58aa9ab52dd2e2583c3

    • SHA512

      3c078b58865d17a9090771c05cb186537eb8ee694de386c6b39079bf13482ead794944759ef42ba428dc60f4625eb7497509966ff10a9768a67829d9ee045aab

    • SSDEEP

      49152:GBWplUwrcROROYc6S6nnc7rtu9nL6rClAE2buJ:DPcIROYcictu1L54

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks