General

  • Target

    eda7443dd691decf8284667f15777428e943f44e9a317a2ff370039a358da276N.exe

  • Size

    1.8MB

  • Sample

    250111-m6eabszpfk

  • MD5

    cf7a269d78d136df54d7106ad087faa0

  • SHA1

    53aac1ead9c43cac6b8d6188e091b10beb4080e9

  • SHA256

    eda7443dd691decf8284667f15777428e943f44e9a317a2ff370039a358da276

  • SHA512

    d69dcd9697c2398d3b2cc1837987ba1e9f1e5660b38ad4890caf18fc774a4e95c017f1a62fc2e9c774d721d38f1e6195bf931d852280c926d5386e0c55d174ad

  • SSDEEP

    49152:EgLqoG1wIHiPeauerfsvrYDRHxpUdhPpcPmSKL7:EgmLifPeahfOM9RpUbpnSK

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

https://fancywaxxers.shop/api

Targets

    • Target

      eda7443dd691decf8284667f15777428e943f44e9a317a2ff370039a358da276N.exe

    • Size

      1.8MB

    • MD5

      cf7a269d78d136df54d7106ad087faa0

    • SHA1

      53aac1ead9c43cac6b8d6188e091b10beb4080e9

    • SHA256

      eda7443dd691decf8284667f15777428e943f44e9a317a2ff370039a358da276

    • SHA512

      d69dcd9697c2398d3b2cc1837987ba1e9f1e5660b38ad4890caf18fc774a4e95c017f1a62fc2e9c774d721d38f1e6195bf931d852280c926d5386e0c55d174ad

    • SSDEEP

      49152:EgLqoG1wIHiPeauerfsvrYDRHxpUdhPpcPmSKL7:EgmLifPeahfOM9RpUbpnSK

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks