General

  • Target

    5d7de4e442a2e7772b4c899d7bfa4eb61e1185d130fbdbb109e0de4f5bf1ef2fN.exe

  • Size

    1.7MB

  • Sample

    241231-zlkb3a1lem

  • MD5

    e9dcb1f16b0f4d16dda27e91e9f394e0

  • SHA1

    47f99cb7c1ccb5a57a95debe478e4bfc7ff07d37

  • SHA256

    5d7de4e442a2e7772b4c899d7bfa4eb61e1185d130fbdbb109e0de4f5bf1ef2f

  • SHA512

    54d9754a741a63637aa565598d4b7db42c27ea86bd37df11b4b91cb543f469e56e02c675ed8d32b0e0b5a303e2079ae55fb3c552c1c7132791cbf1810a51e0fe

  • SSDEEP

    49152:heRYGkpoZljE7wJf2A94F9xxBvI3fWcrIGy:heR3ZZBE77O41xBGfrrI

Malware Config

Extracted

Family

lumma

Targets

    • Target

      5d7de4e442a2e7772b4c899d7bfa4eb61e1185d130fbdbb109e0de4f5bf1ef2fN.exe

    • Size

      1.7MB

    • MD5

      e9dcb1f16b0f4d16dda27e91e9f394e0

    • SHA1

      47f99cb7c1ccb5a57a95debe478e4bfc7ff07d37

    • SHA256

      5d7de4e442a2e7772b4c899d7bfa4eb61e1185d130fbdbb109e0de4f5bf1ef2f

    • SHA512

      54d9754a741a63637aa565598d4b7db42c27ea86bd37df11b4b91cb543f469e56e02c675ed8d32b0e0b5a303e2079ae55fb3c552c1c7132791cbf1810a51e0fe

    • SSDEEP

      49152:heRYGkpoZljE7wJf2A94F9xxBvI3fWcrIGy:heR3ZZBE77O41xBGfrrI

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks