General

  • Target

    initial_d.bat

  • Size

    838B

  • Sample

    250109-a1s53ssram

  • MD5

    b8c74b6c596351ca5bd46c0bb6e98dfd

  • SHA1

    6cb4b41a78059c30be91f2464bf790244a1c99d7

  • SHA256

    babe2715fa636ffaf699ed8176d8ca007b94defdc2ed41fb138803c8847094f4

  • SHA512

    22b256cb20232d00c9e2085a6d54404f3a2a2167931a637e4880054ac75605d15c38f004a69038e70366bd145c755aafef2047b79c7ab72e61566364a1df9610

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://s7.klipdywoziy.shop/hukk7.jpeg

Extracted

Family

lumma

C2

https://hoppricerwir.cyou/api

Targets

    • Target

      initial_d.bat

    • Size

      838B

    • MD5

      b8c74b6c596351ca5bd46c0bb6e98dfd

    • SHA1

      6cb4b41a78059c30be91f2464bf790244a1c99d7

    • SHA256

      babe2715fa636ffaf699ed8176d8ca007b94defdc2ed41fb138803c8847094f4

    • SHA512

      22b256cb20232d00c9e2085a6d54404f3a2a2167931a637e4880054ac75605d15c38f004a69038e70366bd145c755aafef2047b79c7ab72e61566364a1df9610

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks