General

  • Target

    BakkesModSetup.exe

  • Size

    8.3MB

  • Sample

    250103-bnqpvswpdr

  • MD5

    b2554efc048201c086d7be46f42d00bd

  • SHA1

    f6a8986f77c54cce7544d4779a77d878a39ad402

  • SHA256

    d4581c971ca9da0b40b609ed356a986b33e4e81289edacd31dc7ab8348a14d20

  • SHA512

    6e8ed36e85ee9fbbde577ec0b2a5da6ff71872b6580e2caeffdd34820a502b4a8d8e417087a46fe21ac76bb4a9313f4e4068b06696f8ea4285485ef3f41a01da

  • SSDEEP

    196608:AxlS+oStveNjFvtv4jQ0Y4ZLNHDj53lPu6pdWFG:A6+v5cjFvtw00dZLJBNu6Pp

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

https://begguinnerz.biz/api

Targets

    • Target

      BakkesModSetup.exe

    • Size

      8.3MB

    • MD5

      b2554efc048201c086d7be46f42d00bd

    • SHA1

      f6a8986f77c54cce7544d4779a77d878a39ad402

    • SHA256

      d4581c971ca9da0b40b609ed356a986b33e4e81289edacd31dc7ab8348a14d20

    • SHA512

      6e8ed36e85ee9fbbde577ec0b2a5da6ff71872b6580e2caeffdd34820a502b4a8d8e417087a46fe21ac76bb4a9313f4e4068b06696f8ea4285485ef3f41a01da

    • SSDEEP

      196608:AxlS+oStveNjFvtv4jQ0Y4ZLNHDj53lPu6pdWFG:A6+v5cjFvtw00dZLJBNu6Pp

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • A potential corporate email address has been identified in the URL: [email protected]

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks