General

  • Target

    Sigmanly_75579361b244be86a404677b62135d44d6f1e2fa1619a6f3a9030955fd0fc218

  • Size

    2.8MB

  • Sample

    250107-y3ktgsynek

  • MD5

    570eac129387ce77ceec28b6876407f5

  • SHA1

    148d538f8b8cb159cb949cedb5eda01c78133d95

  • SHA256

    75579361b244be86a404677b62135d44d6f1e2fa1619a6f3a9030955fd0fc218

  • SHA512

    b65dc9596e1a6265bd46cc6914f3d969db8e33a35e9f11096eb64ed7a226476ef5cb7b40059971a8ef0c6b807f65d5c95ccae5e795382b0fabb98e9b3746d9fe

  • SSDEEP

    49152:JlqLHQMTg+ArhpWTTtY/y80TpD8w1DyhuTD:JlqLwMTg+ArhSTtYie6yhu3

Malware Config

Extracted

Family

lumma

C2

https://hummskitnj.buzz/api

https://cashfuzysao.buzz/api

https://appliacnesot.buzz/api

https://screwamusresz.buzz/api

https://inherineau.buzz/api

https://scentniej.buzz/api

https://rebuildeso.buzz/api

https://prisonyfork.buzz/api

https://mindhandru.buzz/api

Targets

    • Target

      Sigmanly_75579361b244be86a404677b62135d44d6f1e2fa1619a6f3a9030955fd0fc218

    • Size

      2.8MB

    • MD5

      570eac129387ce77ceec28b6876407f5

    • SHA1

      148d538f8b8cb159cb949cedb5eda01c78133d95

    • SHA256

      75579361b244be86a404677b62135d44d6f1e2fa1619a6f3a9030955fd0fc218

    • SHA512

      b65dc9596e1a6265bd46cc6914f3d969db8e33a35e9f11096eb64ed7a226476ef5cb7b40059971a8ef0c6b807f65d5c95ccae5e795382b0fabb98e9b3746d9fe

    • SSDEEP

      49152:JlqLHQMTg+ArhpWTTtY/y80TpD8w1DyhuTD:JlqLwMTg+ArhSTtYie6yhu3

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks