General

  • Target

    https://bmy7etxgksxo.objectstorage.sa-santiago-1.oci.customer-oci.com/n/bmy7etxgksxo/b/just/o/verif-process-step-final.html

  • Sample

    250106-rr8ylsynaw

Malware Config

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

Targets

    • Target

      https://bmy7etxgksxo.objectstorage.sa-santiago-1.oci.customer-oci.com/n/bmy7etxgksxo/b/just/o/verif-process-step-final.html

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Blocklisted process makes network request

    • A potential corporate email address has been identified in the URL: currency-file@1

    • Executes dropped EXE

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks