General

  • Target

    b97867abffa963b78de5316d7c3f0cadac39a8bfb82a9c7caa3f4c7b5d1519cb.exe

  • Size

    3.1MB

  • Sample

    241120-p9plks1qdq

  • MD5

    6e7b9b876f29b18305a1dd9d1218f18c

  • SHA1

    4b7b2cbc5b91edfb41f05b41ef31d7ec0efdfebd

  • SHA256

    b97867abffa963b78de5316d7c3f0cadac39a8bfb82a9c7caa3f4c7b5d1519cb

  • SHA512

    4c031be5539a05bab6a8d26325057006f1057f89a46047feac0b0634f116a3306a0abe7975ace81d52d050e6be3e4d32ca8b48e2ed0ffbfb3b6ea29409828e1c

  • SSDEEP

    49152:T0zLuOLYLnH6DVIhUgi5zKRGPPhC1yZX2Jz:wzLRYbH6DVIhFYPgCGB

Malware Config

Extracted

Family

lumma

C2

https://scriptyprefej.store

https://navygenerayk.store

https://founpiuer.store

https://necklacedmny.store

https://thumbystriw.store

https://fadehairucw.store

https://crisiwarny.store

https://presticitpo.store

Targets

    • Target

      b97867abffa963b78de5316d7c3f0cadac39a8bfb82a9c7caa3f4c7b5d1519cb.exe

    • Size

      3.1MB

    • MD5

      6e7b9b876f29b18305a1dd9d1218f18c

    • SHA1

      4b7b2cbc5b91edfb41f05b41ef31d7ec0efdfebd

    • SHA256

      b97867abffa963b78de5316d7c3f0cadac39a8bfb82a9c7caa3f4c7b5d1519cb

    • SHA512

      4c031be5539a05bab6a8d26325057006f1057f89a46047feac0b0634f116a3306a0abe7975ace81d52d050e6be3e4d32ca8b48e2ed0ffbfb3b6ea29409828e1c

    • SSDEEP

      49152:T0zLuOLYLnH6DVIhUgi5zKRGPPhC1yZX2Jz:wzLRYbH6DVIhFYPgCGB

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks