General

  • Target

    05d158b0f1ee5f33b7061865e43f29e3e70095f3a5845b9f19d4e45031e4966e.exe

  • Size

    2.8MB

  • Sample

    241231-1atxsssndp

  • MD5

    3ecb60b117d4d1ef9ce47224dab0603e

  • SHA1

    bc8550e0a1be27792b00fa01f2ce6a4aeae03ef6

  • SHA256

    05d158b0f1ee5f33b7061865e43f29e3e70095f3a5845b9f19d4e45031e4966e

  • SHA512

    9a864352c9e065b4886dc2d8faab14c59a3bad8cf5b1e110d30c18812683ecf68b8ce03b0f88764703fce6f7c329389662cc122574701b957be00ebcb3426146

  • SSDEEP

    49152:sL+QJqanJUzeI7HK2yo619gKlXpohDddYxnOt16caym2:w9g2JUzeI7HK2yo619HWldGxnOt16caE

Malware Config

Extracted

Family

lumma

Targets

    • Target

      05d158b0f1ee5f33b7061865e43f29e3e70095f3a5845b9f19d4e45031e4966e.exe

    • Size

      2.8MB

    • MD5

      3ecb60b117d4d1ef9ce47224dab0603e

    • SHA1

      bc8550e0a1be27792b00fa01f2ce6a4aeae03ef6

    • SHA256

      05d158b0f1ee5f33b7061865e43f29e3e70095f3a5845b9f19d4e45031e4966e

    • SHA512

      9a864352c9e065b4886dc2d8faab14c59a3bad8cf5b1e110d30c18812683ecf68b8ce03b0f88764703fce6f7c329389662cc122574701b957be00ebcb3426146

    • SSDEEP

      49152:sL+QJqanJUzeI7HK2yo619gKlXpohDddYxnOt16caym2:w9g2JUzeI7HK2yo619HWldGxnOt16caE

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks