General

  • Target

    cc5eb5ac7cb599572a1c9747efa83774221e0ad4a24ed6545d5bc03a44a23196.exe

  • Size

    15KB

  • Sample

    241231-dfa1jstnb1

  • MD5

    9be5ac720dcf1838fd5a2d7352672f66

  • SHA1

    d8046191a1d1756768a8bad62ce3ba757deb7d53

  • SHA256

    cc5eb5ac7cb599572a1c9747efa83774221e0ad4a24ed6545d5bc03a44a23196

  • SHA512

    72f618868c9960332931d7055a4bff5b3394979a1f5d8089d51c6dc436a121a3d9332d405a3eb3f65fcb8c5930c73606e194782fcf29b46d5e42235de29acc33

  • SSDEEP

    384:8dGRmTbW+eO9GXSrtx2MUyQ6JCgf61FDOVV:QzGXaff61FDO7

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Extracted

Family

lumma

C2

https://framekgirus.shop/api

https://abruptyopsn.shop/api

https://wholersorie.shop/api

https://tirepublicerj.shop/api

https://noisycuttej.shop/api

https://rabidcowse.shop/api

https://cloudewahsj.shop/api

Targets

    • Target

      cc5eb5ac7cb599572a1c9747efa83774221e0ad4a24ed6545d5bc03a44a23196.exe

    • Size

      15KB

    • MD5

      9be5ac720dcf1838fd5a2d7352672f66

    • SHA1

      d8046191a1d1756768a8bad62ce3ba757deb7d53

    • SHA256

      cc5eb5ac7cb599572a1c9747efa83774221e0ad4a24ed6545d5bc03a44a23196

    • SHA512

      72f618868c9960332931d7055a4bff5b3394979a1f5d8089d51c6dc436a121a3d9332d405a3eb3f65fcb8c5930c73606e194782fcf29b46d5e42235de29acc33

    • SSDEEP

      384:8dGRmTbW+eO9GXSrtx2MUyQ6JCgf61FDOVV:QzGXaff61FDO7

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks