General

  • Target

    loader (1).zip

  • Size

    34.5MB

  • Sample

    250106-xbw7rswman

  • MD5

    8425203f717d3b43aab69e2169e287e9

  • SHA1

    12db69a1426b083f47c0a206bf64a8e71cb901c1

  • SHA256

    ecf3a39be3f3a39e64df404c81739c27ca31bff1143e4ec286b4574a3fded52c

  • SHA512

    f6a61629d4c018ea50213fe8d0f11bf3862e4689926c66e3dbf41bc37ff7b94102ee533accc9b9aad9d59324ac3290847979da5776f586a549af11dfccddbdb6

  • SSDEEP

    786432:wELl1Qasqsztsl9dMYAmIvVoNcTgWmqqldMLJN+vAYxeeYyAy+he/8f46:wEcvm9d4bTTgWmqcddAycNf46

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Extracted

Family

lumma

C2

https://wholersorie.shop/api

https://framekgirus.shop/api

https://tirepublicerj.shop/api

https://noisycuttej.shop/api

https://rabidcowse.shop/api

Targets

    • Target

      loader/GameAssembly.dll

    • Size

      49.6MB

    • MD5

      810fe96b07cdd51bdcca116e84482716

    • SHA1

      8a26b17249f3ccaf8491ac920d333ac18a7f9ed3

    • SHA256

      f7362833fb951bd938293021a92b8e8fb5f4f7f7320b763600593625be46d18c

    • SHA512

      0cd09d63132dfc92145edae91000729e2fcc1dbf1ed0f35ae97de36874f8c76813b788c2d3d24d6ac1fd11a8901a1bf9d6ffb46dd7ef62f715904a6296166e76

    • SSDEEP

      393216:l0Ag26hX3X+bhN/ngSINo63UXqU9bcmo7WqA6AVc8SgvDPG/8jh9B6apgNbVroHV:6o1c1j2rB6SoZT178p

    Score
    1/10
    • Target

      loader/UG.dll

    • Size

      6.3MB

    • MD5

      dd50e42773b65da95f945699ca9b2504

    • SHA1

      5982c771d3108e8a4b24ad69ba7e8e1578a4ac48

    • SHA256

      7ba45e7e5e70feeabbb42cd1c6e4c6dac7d4b23ce6a5fb8f7542e845d53bdf5a

    • SHA512

      f45ddd16e4a58c332bd2992b7b071ec65085d1d981ca3447c70c8b2e849954a8c37020a340922c77ec40b572252cc3e537bcf3ac5f4dd64750b8d218d38a5f81

    • SSDEEP

      196608:B21bYRhx+M70PT82AcoE2AEHn47SNpfWLq33u:NRhGPpAtE2xnv/faqn

    Score
    5/10
    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      loader/UnityPlayer.dll

    • Size

      24.8MB

    • MD5

      bcd71df68fc7b5215fd642ee3d00b8d1

    • SHA1

      a98d7948cbfd2342deea40c546f4fb948ac7289c

    • SHA256

      766ab725272a81d7f2743976f8262bfb290854de037dd49e856e1411112294b8

    • SHA512

      90d878498788b6b9ba2b9191bc9f14ff31e3956748275708358d8a482f2f0b9cd031d2ba05b64da2c00111d732b9b3e79424e3395fd0db0fa41beb9fef2b220e

    • SSDEEP

      393216:vuTF72VRIX6/GEpHhFoE5C2kFsvli/BYFr:vA2FoaXI52

    Score
    1/10
    • Target

      loader/loader.exe

    • Size

      8.3MB

    • MD5

      fc218a603912062090c532efebbb92f1

    • SHA1

      6e345f5562f69e62db856399a481e4f9d58b9f96

    • SHA256

      234c2c325b0b34e822a6ba3c948cc485c73333bc7a0f8e71e05581256f1ec02c

    • SHA512

      643be57ca8f17e68bc2db7222511e3cc799f9a9d59e13b2359f3f661622c33313ecb957014454b45f1a055edd201c42680f76680e568344b08748925fca48439

    • SSDEEP

      6144:NhqNNoFApAi86VbQoxIT2PxsezS4uXveD5dSh7S2Hmd3iZApQkMIRYotM:NoNNmmPjVseIW6zXvelUBwVdxRYN

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Suspicious use of SetThreadContext

    • Target

      loader/winhttp.dll

    • Size

      24KB

    • MD5

      4026799bdfd39a6cff71445516010830

    • SHA1

      5d5ebc8e7e4d92febd2011e82b65a6edc0809e8c

    • SHA256

      7e90398dd7154b41f76e0524aedb795a7bcbe2ed9a14e4ceee214235aa04e442

    • SHA512

      41587a6cea71d68b54fd784397b33d740f0a9a2d7eeec2577ebccd245acfb05a151ba3ce0d3e2a6b3fdfba1242cd9d59434dca8b746c6cd1f964481fee024ce6

    • SSDEEP

      384:m6+oD3tKnkqnUY444fFbZ29y37Qz5EJ9Wj2V+cmsC1fxgKTmkF6c/Xm4XDycmck7:Ca3L0L4my37AB2ssC1fxgKTRzD3mckVN

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks