General

  • Target

    4b2e91707d872ef8933a70c50c0c2f6b1ad175966e150da216583fec1cf11b2f.zip

  • Size

    7.7MB

  • Sample

    241230-f7fq8azlbv

  • MD5

    669973e0e1c0167e0bfbfedfb7671331

  • SHA1

    d4668daec9c3965a2e939110bd92d78266b59fb1

  • SHA256

    4b2e91707d872ef8933a70c50c0c2f6b1ad175966e150da216583fec1cf11b2f

  • SHA512

    670b3ca6922428f6ade47fa2475b8651578b734e8fdff4beb2e1d051f49b82e4868884177ad9ea1db08e373e6e1af64197bc5094370730b9d892739347e9d18b

  • SSDEEP

    196608:vxoqVSnh7+rd/X6yKynvHPkwotZoZC3m67qlz5:viQShKP6yznro8ZzQy5

Score
10/10

Malware Config

Extracted

Family

lumma

Targets

    • Target

      Setup.exe

    • Size

      780.4MB

    • MD5

      65d41c54db9e06fea154cf2f61ef02f9

    • SHA1

      64bccbd2ab6d4b6ef54eae218356b761877c0bcf

    • SHA256

      aa68ff2a1f4cfd6c701c5b2e540dede1cb6a26db7f1ea0c6ea34b3ac48c69b54

    • SHA512

      0559cf6a3b68e94cdd5e4ecb14ea358fb3fa16ddc096c3d548935b9d8ffdbec13434aba108c9a7fdd12797c7cbc210e0c6430731102cd2576b7faf27392cacbd

    • SSDEEP

      98304:nxzHl6IRhexfKtQRIc9cUc9cUc9cUc9cUc9cUc9cUc9cUc9cUc9cUc9cUc9cUc9N:xpRMxfKtQE

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks