General

  • Target

    a58c2381b3a09794c5f79c1bc6358fd9.bin

  • Size

    1.7MB

  • Sample

    241119-b2zjxsybpb

  • MD5

    0988fe17518d330107eb518be6014001

  • SHA1

    1197316cd20b65798ae3ebcd626bd9661ed83f12

  • SHA256

    68fb6bcd58b6bc5c14cd91ee99929fca4061b66fd88a6f25f9c97899bd312027

  • SHA512

    61a574a000914f0fc504c39eaf9166f105ae97647223c4574ecf8dd8f109a40ee6e13615df5e2ee7588c5a8f0d8d17c050a4ef97ce1e2b2698ec503c8615bc64

  • SSDEEP

    49152:iSGe30WricTx265KMHrGNCdiEtEszAE2wep8omOUZ9bOv0vyP:iSGMh0gHrz8E2tp8oWZVKzP

Malware Config

Extracted

Family

lumma

C2

https://processhol.sbs/api

https://p10tgrace.sbs/api

https://peepburry828.sbs/api

https://3xp3cts1aim.sbs/api

https://p3ar11fter.sbs/api

Targets

    • Target

      fef10d7378cf8912453034be5c0b36bab453d66962290a1a0b64222fb30f4e56.exe

    • Size

      1.8MB

    • MD5

      a58c2381b3a09794c5f79c1bc6358fd9

    • SHA1

      70db592fd9154a831da656438c3f558c376b1053

    • SHA256

      fef10d7378cf8912453034be5c0b36bab453d66962290a1a0b64222fb30f4e56

    • SHA512

      4c5674acf0a738b09c6189ef04cccf33f33fdadace1e70bec3d163c934fd9343b4904bf952597647b6e0605b011898ff654e7b7dd2672dc3aa8cf5ebd8f41c40

    • SSDEEP

      49152:tSCX+wKP8BbVj9qpptHUexGlt3nyLcndhW3Zeu:Afgbp9U0eolpyLMI5

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks