General

  • Target

    file (1).7z

  • Size

    4.8MB

  • Sample

    250109-x7khvaymex

  • MD5

    fa7948c7125f2ebf36fb9218b6eb0677

  • SHA1

    8ffd3af66d0b3fa2c99f9c8a49592abaf08585a7

  • SHA256

    b8c493757e334234ae3f39cd7cd6ee680f2bb155ea2a6055fdb2415f9d3c2676

  • SHA512

    7d0b6a5b94e798fc70a41129975f7a93ab5988b747aca6bc914fb3831db2ba942871fc2313fb2a906a95e80581c77560551049a1e54283a77ace4484af376a97

  • SSDEEP

    98304:frNnnmbWCM3Nf/76IjkEADlQHH5bzsH5uVzA7fRT1KF46WEBz02LO14ZwGq:frxnKVoB/OMqiHHhs2iT1Ki6nzrdwV

Malware Config

Extracted

Family

lumma

C2

https://robinsharez.shop/api

https://handscreamny.shop/api

https://chipdonkeruz.shop/api

https://versersleep.shop/api

https://crowdwarek.shop/api

https://apporholis.shop/api

https://femalsabler.shop/api

https://soundtappysk.shop/api

https://breathauthorit.cyou/api

Extracted

Family

lumma

C2

https://breathauthorit.cyou/api

Targets

    • Target

      file.exe

    • Size

      830.2MB

    • MD5

      424002ad028d34a391530de7056e1a3e

    • SHA1

      789ce1a150ae617905f780d1e954ebc5f131cb55

    • SHA256

      4e16b88993763f67736946986abea47678ad68d3f79735579b10a35472fd1909

    • SHA512

      f35eff83f93de61fe57c598288a419eabe0f1dbcb2f137dc0dde9d8b576d317d30f63d9f7bb2440ea9479919bfbd25d351761174272e8372589a0149eb2072bd

    • SSDEEP

      98304:6nEph1de+/e/LsugyAvWoW1ZfrKepi918AjF+zpGYBt+XE2j+Fba3/fbwT0:0gh1KLhgyRoW7Y9f+jBc02j+I/fW

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks