General

  • Target

    https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbERIZjhRcm4yYVU5aVlxcW1mcUtqMUt4eUstQXxBQ3Jtc0tta25wUWE5T01ZWEFtaURraU1hengxcjRyVEZoWmVuS3dGZkJxMGJfQUlsanYzV1dKNmNTdllDZHFKdlRMdjVSV18zNGRpd0pXUXdOTnhmOWFqcG1GbXJIQXo4Y2ZwcXhjdVNNTWlXUFllZ25NMXB6VQ&q=https%3A%2F%2Fgithub.com%2FAmsterdamA1%2FAmsterdam%2Freleases%2Fdownload%2F2.0%2FSetup.Program.zip&v=nSi4avg7vM4

  • Sample

    241126-wj2a1symbj

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    188.120.227.9
  • Port:
    21
  • Username:
    PK1
  • Password:
    PK1

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    193.149.189.199
  • Port:
    21
  • Username:
    ins
  • Password:
    installer

Extracted

Family

lumma

C2

https://p3ar11fter.sbs

https://3xp3cts1aim.sbs

https://owner-vacat10n.sbs

https://peepburry828.sbs

https://p10tgrace.sbs

https://befall-sm0ker.sbs

https://librari-night.sbs

https://processhol.sbs

Extracted

Family

darkcomet

Botnet

Guest1690

C2

65.38.120.136:1690

Mutex

DC_MUTEX-F54S21D

Attributes
  • gencode

    U2oxviM8ZSYf

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Targets

    • Target

      https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbERIZjhRcm4yYVU5aVlxcW1mcUtqMUt4eUstQXxBQ3Jtc0tta25wUWE5T01ZWEFtaURraU1hengxcjRyVEZoWmVuS3dGZkJxMGJfQUlsanYzV1dKNmNTdllDZHFKdlRMdjVSV18zNGRpd0pXUXdOTnhmOWFqcG1GbXJIQXo4Y2ZwcXhjdVNNTWlXUFllZ25NMXB6VQ&q=https%3A%2F%2Fgithub.com%2FAmsterdamA1%2FAmsterdam%2Freleases%2Fdownload%2F2.0%2FSetup.Program.zip&v=nSi4avg7vM4

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks