General

  • Target

    Sigmanly_7039e6fb048b2a7511b7095958332a7300cc42e66142b4c815f18cd02b6f1b69

  • Size

    5.9MB

  • Sample

    250105-nrdkxsvpdj

  • MD5

    5b8011576b37d84db9122786cded9f55

  • SHA1

    19cfa391040bae58c5d623f5515e1505996fe646

  • SHA256

    7039e6fb048b2a7511b7095958332a7300cc42e66142b4c815f18cd02b6f1b69

  • SHA512

    5eb25ca3129aa9ec0352864d8717355230bc9bbcb0a0c271197c2a4f6c72ef16c092772317440461e1d24d77fe3cafd5d1ab191d9e65690b18f8240fbd279021

  • SSDEEP

    98304:hOz2MJHt7ylFablAuWSvn0n/5b0GC08A6PlATT9si+oc2pWwehjcuv03usdbQgST:SbxN+Qvn0nBb0N0pg2NZowcckAuKkVwL

Malware Config

Extracted

Family

lumma

Targets

    • Target

      Sigmanly_7039e6fb048b2a7511b7095958332a7300cc42e66142b4c815f18cd02b6f1b69

    • Size

      5.9MB

    • MD5

      5b8011576b37d84db9122786cded9f55

    • SHA1

      19cfa391040bae58c5d623f5515e1505996fe646

    • SHA256

      7039e6fb048b2a7511b7095958332a7300cc42e66142b4c815f18cd02b6f1b69

    • SHA512

      5eb25ca3129aa9ec0352864d8717355230bc9bbcb0a0c271197c2a4f6c72ef16c092772317440461e1d24d77fe3cafd5d1ab191d9e65690b18f8240fbd279021

    • SSDEEP

      98304:hOz2MJHt7ylFablAuWSvn0n/5b0GC08A6PlATT9si+oc2pWwehjcuv03usdbQgST:SbxN+Qvn0nBb0N0pg2NZowcckAuKkVwL

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks