General

  • Target

    88a8faa0a45274fce3a20a966d4b39fec2fdf3bf541fbdffa51a55e8b27d45de

  • Size

    2.9MB

  • Sample

    241121-k7ftfavpcp

  • MD5

    3f9478149d4aaa1b407d7a5cc1278782

  • SHA1

    d3492540ac5a88f95dd2d1d20412132af15f104d

  • SHA256

    88a8faa0a45274fce3a20a966d4b39fec2fdf3bf541fbdffa51a55e8b27d45de

  • SHA512

    83f603caf97a385302bf922fff97941ee2e19b07d3758ea522186d1e19d39a9b23777b925ee289e3ebf84fe5bc1fa8a930ca65d8c54ebd7f05f9e62bf8a6ec0f

  • SSDEEP

    49152:dmHVO1r/AyHDhDmpSu7ScoqX3iHYYeoN2yGw7:dCYF/AyHDhoSTxO3bYeoN2

Malware Config

Extracted

Family

lumma

C2

https://scriptyprefej.store

https://navygenerayk.store

https://founpiuer.store

https://necklacedmny.store

https://thumbystriw.store

https://fadehairucw.store

https://crisiwarny.store

https://presticitpo.store

Targets

    • Target

      88a8faa0a45274fce3a20a966d4b39fec2fdf3bf541fbdffa51a55e8b27d45de

    • Size

      2.9MB

    • MD5

      3f9478149d4aaa1b407d7a5cc1278782

    • SHA1

      d3492540ac5a88f95dd2d1d20412132af15f104d

    • SHA256

      88a8faa0a45274fce3a20a966d4b39fec2fdf3bf541fbdffa51a55e8b27d45de

    • SHA512

      83f603caf97a385302bf922fff97941ee2e19b07d3758ea522186d1e19d39a9b23777b925ee289e3ebf84fe5bc1fa8a930ca65d8c54ebd7f05f9e62bf8a6ec0f

    • SSDEEP

      49152:dmHVO1r/AyHDhDmpSu7ScoqX3iHYYeoN2yGw7:dCYF/AyHDhoSTxO3bYeoN2

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks