General

  • Target

    8be06ad676b76e25164e3c83e1f5bc69c0cb5417bceeee1dc03799b9c7261653

  • Size

    1.8MB

  • Sample

    241119-mglywathmg

  • MD5

    1c9baba3863eb6e2cd1fcfcb0fb31d1f

  • SHA1

    d3d44d8c18d93be08804bdc8a98d82c791d9487a

  • SHA256

    8be06ad676b76e25164e3c83e1f5bc69c0cb5417bceeee1dc03799b9c7261653

  • SHA512

    eb0a3e427cf28c5b41b6ecc63dd133290ab94cfed98f7774c02fd684b7f00633a847dadfe668680b7f6545d63e9a5073b51b4ce6bc820124dfcd5ede3db8097f

  • SSDEEP

    49152:EZCukInn+ihRqLAxLLWnXii1WWwAdw4I5IM0kngh:ofnwExnWyqWWpw4SInkgh

Malware Config

Extracted

Family

lumma

C2

https://processhol.sbs/api

https://p10tgrace.sbs/api

https://peepburry828.sbs/api

https://3xp3cts1aim.sbs/api

https://p3ar11fter.sbs/api

Targets

    • Target

      8be06ad676b76e25164e3c83e1f5bc69c0cb5417bceeee1dc03799b9c7261653

    • Size

      1.8MB

    • MD5

      1c9baba3863eb6e2cd1fcfcb0fb31d1f

    • SHA1

      d3d44d8c18d93be08804bdc8a98d82c791d9487a

    • SHA256

      8be06ad676b76e25164e3c83e1f5bc69c0cb5417bceeee1dc03799b9c7261653

    • SHA512

      eb0a3e427cf28c5b41b6ecc63dd133290ab94cfed98f7774c02fd684b7f00633a847dadfe668680b7f6545d63e9a5073b51b4ce6bc820124dfcd5ede3db8097f

    • SSDEEP

      49152:EZCukInn+ihRqLAxLLWnXii1WWwAdw4I5IM0kngh:ofnwExnWyqWWpw4SInkgh

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks