General

  • Target

    965fd82d236db410e9ad11e763cbc39b13b5b5434e60e9f143c576860f896428.exe

  • Size

    3.0MB

  • Sample

    241120-px1hbaxjfv

  • MD5

    543cfe79ac537004387bfd18c21fdf23

  • SHA1

    a612d9afe3727414f8450172305ac1e92e576b21

  • SHA256

    965fd82d236db410e9ad11e763cbc39b13b5b5434e60e9f143c576860f896428

  • SHA512

    0ef19e7da139b6e2b56718133c7b84f695d7d879dfe25948cccfaff11b7cc1c92d96013d9b3cddc0166494c6ab7813c760def08415c4ce94625336f5d1b3a34d

  • SSDEEP

    49152:LBicobSG0q+bCd4qoCjfpTSWPJCq1EXvDYehkG+jSFzWrar6yV:sFbr0qGCdJoCDp2WRrWkGEScmrT

Malware Config

Extracted

Family

lumma

C2

https://scriptyprefej.store

https://navygenerayk.store

https://founpiuer.store

https://necklacedmny.store

https://thumbystriw.store

https://fadehairucw.store

https://crisiwarny.store

https://presticitpo.store

Targets

    • Target

      965fd82d236db410e9ad11e763cbc39b13b5b5434e60e9f143c576860f896428.exe

    • Size

      3.0MB

    • MD5

      543cfe79ac537004387bfd18c21fdf23

    • SHA1

      a612d9afe3727414f8450172305ac1e92e576b21

    • SHA256

      965fd82d236db410e9ad11e763cbc39b13b5b5434e60e9f143c576860f896428

    • SHA512

      0ef19e7da139b6e2b56718133c7b84f695d7d879dfe25948cccfaff11b7cc1c92d96013d9b3cddc0166494c6ab7813c760def08415c4ce94625336f5d1b3a34d

    • SSDEEP

      49152:LBicobSG0q+bCd4qoCjfpTSWPJCq1EXvDYehkG+jSFzWrar6yV:sFbr0qGCdJoCDp2WRrWkGEScmrT

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks