General

  • Target

    Sigmanly_f4206cdda68f0d5e65006e954d7481aac64cd94a43d2311cfdfbbfdd2cbf8f58

  • Size

    1.8MB

  • Sample

    250107-p8nmwstpgp

  • MD5

    63e1ee575307e1edd1e0b7357a5bafed

  • SHA1

    ca3177f3bc4b1dbc75736cf81981c78d68f42f7a

  • SHA256

    f4206cdda68f0d5e65006e954d7481aac64cd94a43d2311cfdfbbfdd2cbf8f58

  • SHA512

    7714f79f612316159f15a39073da18c8fdcf27707f00e9bb5fb9e9e7d2fb30d35d06aa7d1badba5d6066cc799190e2963cfa26ca2f7a10a13769c43c08e17612

  • SSDEEP

    49152:RbCs9/uselbwEYu04zVhinPfSLzM+BQH9bJGDw:p/nelmezVMPeA1N6w

Malware Config

Extracted

Family

lumma

C2

https://hummskitnj.buzz/api

https://cashfuzysao.buzz/api

https://appliacnesot.buzz/api

https://screwamusresz.buzz/api

https://inherineau.buzz/api

https://scentniej.buzz/api

https://rebuildeso.buzz/api

https://prisonyfork.buzz/api

https://mindhandru.buzz/api

Targets

    • Target

      Sigmanly_f4206cdda68f0d5e65006e954d7481aac64cd94a43d2311cfdfbbfdd2cbf8f58

    • Size

      1.8MB

    • MD5

      63e1ee575307e1edd1e0b7357a5bafed

    • SHA1

      ca3177f3bc4b1dbc75736cf81981c78d68f42f7a

    • SHA256

      f4206cdda68f0d5e65006e954d7481aac64cd94a43d2311cfdfbbfdd2cbf8f58

    • SHA512

      7714f79f612316159f15a39073da18c8fdcf27707f00e9bb5fb9e9e7d2fb30d35d06aa7d1badba5d6066cc799190e2963cfa26ca2f7a10a13769c43c08e17612

    • SSDEEP

      49152:RbCs9/uselbwEYu04zVhinPfSLzM+BQH9bJGDw:p/nelmezVMPeA1N6w

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks