General

  • Target

    65d571f109a4251c15867fe5b9364547a5031bcad8338ad7b9024c0ad4b7712a

  • Size

    2.8MB

  • Sample

    241121-yxv29s1kfl

  • MD5

    f3ccf50f560ec161f3e89962a48bcb6a

  • SHA1

    5e3d9b8ddf5b672d8ae18e28b9f7d4b3efe45b76

  • SHA256

    65d571f109a4251c15867fe5b9364547a5031bcad8338ad7b9024c0ad4b7712a

  • SHA512

    0b9baddd1d96ceec39d47ed31128e17248eb6cd24a1837027eac2ab5791de1b8df3ed4cd296a7935eac10b81b1bf1abcf64c79f0caa48b9e5567e5c23d7d079e

  • SSDEEP

    24576:QTvqyoiqyMhdEOpHjhKySchvnG64931POpsb4GrEe77NMbDIOQGGuSBhvX4+VVIx:qvoimUpyH+60AGxvN6za5Tpvqqqj2i

Malware Config

Extracted

Family

lumma

C2

https://scriptyprefej.store

https://navygenerayk.store

https://founpiuer.store

https://necklacedmny.store

https://thumbystriw.store

https://fadehairucw.store

https://crisiwarny.store

https://presticitpo.store

Targets

    • Target

      65d571f109a4251c15867fe5b9364547a5031bcad8338ad7b9024c0ad4b7712a

    • Size

      2.8MB

    • MD5

      f3ccf50f560ec161f3e89962a48bcb6a

    • SHA1

      5e3d9b8ddf5b672d8ae18e28b9f7d4b3efe45b76

    • SHA256

      65d571f109a4251c15867fe5b9364547a5031bcad8338ad7b9024c0ad4b7712a

    • SHA512

      0b9baddd1d96ceec39d47ed31128e17248eb6cd24a1837027eac2ab5791de1b8df3ed4cd296a7935eac10b81b1bf1abcf64c79f0caa48b9e5567e5c23d7d079e

    • SSDEEP

      24576:QTvqyoiqyMhdEOpHjhKySchvnG64931POpsb4GrEe77NMbDIOQGGuSBhvX4+VVIx:qvoimUpyH+60AGxvN6za5Tpvqqqj2i

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks