General

  • Target

    oLjfePjg.txt

  • Size

    40.7MB

  • Sample

    241127-rgs5eawphs

  • MD5

    88a5f6c22e2fb3a57f186338c207fb13

  • SHA1

    0e80bef96bc198797cf05521192e492fb068a3bc

  • SHA256

    337878fbbbf37304642477ba26b75b1bfb6a39949463c2ba718f41430ac1b5ee

  • SHA512

    c060b99e30a8cb2755471040e32a517f78f0369cb57d794010e2ca66064446800bb272f0db1fdd8af7ce0c7269d95dd4fdb4b27df2d1a179c0ffc199765a1147

  • SSDEEP

    49152:rqQWkpJekS1LZHDWNsLBvvY5r6sosgmFoPdCNDSFHjYljUQoy/7VK7n09YTidHiO:P

Malware Config

Extracted

Family

lumma

C2

https://powerful-avoids.sbs

https://motion-treesz.sbs

https://disobey-curly.sbs

https://leg-sate-boat.sbs

https://story-tense-faz.sbs

https://blade-govern.sbs

https://occupy-blushi.sbs

https://frogs-severz.sbs

https://motionless-temper.cyou

Extracted

Family

lumma

C2

https://motionless-temper.cyou/api

Targets

    • Target

      oLjfePjg.txt

    • Size

      40.7MB

    • MD5

      88a5f6c22e2fb3a57f186338c207fb13

    • SHA1

      0e80bef96bc198797cf05521192e492fb068a3bc

    • SHA256

      337878fbbbf37304642477ba26b75b1bfb6a39949463c2ba718f41430ac1b5ee

    • SHA512

      c060b99e30a8cb2755471040e32a517f78f0369cb57d794010e2ca66064446800bb272f0db1fdd8af7ce0c7269d95dd4fdb4b27df2d1a179c0ffc199765a1147

    • SSDEEP

      49152:rqQWkpJekS1LZHDWNsLBvvY5r6sosgmFoPdCNDSFHjYljUQoy/7VK7n09YTidHiO:P

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks