General

  • Target

    title.mp4.hta

  • Size

    2.6MB

  • Sample

    250106-p47j7sxjcs

  • MD5

    5ffa4145e79128ab1c56abfb5a8455d7

  • SHA1

    e8cec6950853414976683615b1467b1d4dae8ee6

  • SHA256

    3cf8f04202e09ddfff4c1febc10873a38258116fadd806ce1110f36445bbeaf0

  • SHA512

    b0c4356886e40cc9dce4eb2c0918ed4ef88dc9ef7441963d89ff3c0790d2e49b3319ea3a26094a496350163eb98f39888822bbf67530e38a5bd32a427e7884c1

  • SSDEEP

    49152:SSQwzfrpqz053/ySQwzfrpqzoSQwzfrpqzoSQwzfrpqzd:SgIVgIsgI0gIR

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://cabf.klipdesak.shop/smugle.bd

Extracted

Family

lumma

C2

https://wholersorie.shop/api

https://framekgirus.shop/api

https://tirepublicerj.shop/api

https://noisycuttej.shop/api

https://rabidcowse.shop/api

Targets

    • Target

      title.mp4.hta

    • Size

      2.6MB

    • MD5

      5ffa4145e79128ab1c56abfb5a8455d7

    • SHA1

      e8cec6950853414976683615b1467b1d4dae8ee6

    • SHA256

      3cf8f04202e09ddfff4c1febc10873a38258116fadd806ce1110f36445bbeaf0

    • SHA512

      b0c4356886e40cc9dce4eb2c0918ed4ef88dc9ef7441963d89ff3c0790d2e49b3319ea3a26094a496350163eb98f39888822bbf67530e38a5bd32a427e7884c1

    • SSDEEP

      49152:SSQwzfrpqz053/ySQwzfrpqzoSQwzfrpqzoSQwzfrpqzd:SgIVgIsgI0gIR

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks