General

  • Target

    05098954b7299f980120fd3663787f7e02e4c3602a3728e1d3e28fbe4826aaf7N.exe

  • Size

    1.8MB

  • Sample

    250120-yerbcswjg1

  • MD5

    2fb9171a01864310ecb8503f51eaa190

  • SHA1

    be6c68d2c14e27cb1efd7947583d1410947bd6e8

  • SHA256

    05098954b7299f980120fd3663787f7e02e4c3602a3728e1d3e28fbe4826aaf7

  • SHA512

    bf01687d1c28b979f6e31fa84605716cae91cb3b54a2d264567aeef9535503ddb435816bf117d0cc4324c68909eb22d13aa5b7976e072d67b159285d1f79249e

  • SSDEEP

    49152:uxRHSVKV+h4Oihz/nCAyy9QSkEXrWNbI5f3r:uxRHSVqdd/CAdfT7SQ

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Targets

    • Target

      05098954b7299f980120fd3663787f7e02e4c3602a3728e1d3e28fbe4826aaf7N.exe

    • Size

      1.8MB

    • MD5

      2fb9171a01864310ecb8503f51eaa190

    • SHA1

      be6c68d2c14e27cb1efd7947583d1410947bd6e8

    • SHA256

      05098954b7299f980120fd3663787f7e02e4c3602a3728e1d3e28fbe4826aaf7

    • SHA512

      bf01687d1c28b979f6e31fa84605716cae91cb3b54a2d264567aeef9535503ddb435816bf117d0cc4324c68909eb22d13aa5b7976e072d67b159285d1f79249e

    • SSDEEP

      49152:uxRHSVKV+h4Oihz/nCAyy9QSkEXrWNbI5f3r:uxRHSVqdd/CAdfT7SQ

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks