General

  • Target

    file.exe

  • Size

    1.8MB

  • Sample

    241119-mmnpnavgjm

  • MD5

    e88c167dbdf77ae802bdcdf1bd4a233a

  • SHA1

    3799fe37253cc2ec389254b72f8aa00cca1a257d

  • SHA256

    96f4bc1469a5c172054bf2a70298d6ff0d7f822957e1f50dd6328d48675066ab

  • SHA512

    b2f9ba9faf4bac791be4a54331c1a003179f9e41a7d69c677f486e2f5fd7d592047a0a3311ad20acb33c4d6808025812ece8bbd7ed3f6fb4dc770db8bcba1d26

  • SSDEEP

    49152:lPliKFVgm5GRq8WMteeksp/jzfZjxavikX7CI1FOG3Be4v91:FlnVgreekcRjxavP71Y4Mof

Malware Config

Extracted

Family

lumma

C2

https://processhol.sbs/api

https://p10tgrace.sbs/api

https://peepburry828.sbs/api

https://3xp3cts1aim.sbs/api

https://p3ar11fter.sbs/api

Targets

    • Target

      file.exe

    • Size

      1.8MB

    • MD5

      e88c167dbdf77ae802bdcdf1bd4a233a

    • SHA1

      3799fe37253cc2ec389254b72f8aa00cca1a257d

    • SHA256

      96f4bc1469a5c172054bf2a70298d6ff0d7f822957e1f50dd6328d48675066ab

    • SHA512

      b2f9ba9faf4bac791be4a54331c1a003179f9e41a7d69c677f486e2f5fd7d592047a0a3311ad20acb33c4d6808025812ece8bbd7ed3f6fb4dc770db8bcba1d26

    • SSDEEP

      49152:lPliKFVgm5GRq8WMteeksp/jzfZjxavikX7CI1FOG3Be4v91:FlnVgreekcRjxavP71Y4Mof

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks