General

  • Target

    eb58db1db82012e283903925b9f45c73ff3427ef522c853bc286ed9e395924a9N.exe

  • Size

    2.8MB

  • Sample

    241230-y4tg1szmbz

  • MD5

    1778a174a471fdec99c35907f2267d30

  • SHA1

    4867feba972b8cab9eb49ce4421b88193bff2d0b

  • SHA256

    eb58db1db82012e283903925b9f45c73ff3427ef522c853bc286ed9e395924a9

  • SHA512

    a8ccb13ea18d12643d59507f98ea4947d92f9eb5faafca305ff9e01b371bf441821a297fc481a53f0ccb9eb541ec71d15663c9d76cdcd6397f6f68a877a0e60d

  • SSDEEP

    49152:sL+QJqanJUzeI7HK2yo619gKlXpohDddYxnOt16caym:w9g2JUzeI7HK2yo619HWldGxnOt16caV

Malware Config

Extracted

Family

lumma

Targets

    • Target

      eb58db1db82012e283903925b9f45c73ff3427ef522c853bc286ed9e395924a9N.exe

    • Size

      2.8MB

    • MD5

      1778a174a471fdec99c35907f2267d30

    • SHA1

      4867feba972b8cab9eb49ce4421b88193bff2d0b

    • SHA256

      eb58db1db82012e283903925b9f45c73ff3427ef522c853bc286ed9e395924a9

    • SHA512

      a8ccb13ea18d12643d59507f98ea4947d92f9eb5faafca305ff9e01b371bf441821a297fc481a53f0ccb9eb541ec71d15663c9d76cdcd6397f6f68a877a0e60d

    • SSDEEP

      49152:sL+QJqanJUzeI7HK2yo619gKlXpohDddYxnOt16caym:w9g2JUzeI7HK2yo619HWldGxnOt16caV

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks