General

  • Target

    34.ps1

  • Size

    1KB

  • Sample

    250122-wfs58synam

  • MD5

    68bddac7ac658f9f72b58f984399756f

  • SHA1

    f424b6c82945ddb068f8f7bc2f6ff2a72f5bf2d9

  • SHA256

    cec8edd890e127b429f7801501f8637036048ca6f2d3c64b2c4d64f2168b07fd

  • SHA512

    cb56d4642ec4cf77a96c059094cc9261a7136bdce4c313dcacae6e94db6e320dafb9be5498e33524315a21fc0d10a4c7d663b3bd096957c773df7de9c34d8d98

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    shaileshvisionaryastrologer.com
  • Port:
    21
  • Username:
    AstroVision
  • Password:
    Ve!0mh16

Extracted

Family

lumma

C2

https://suggestyuoz.biz/api

Targets

    • Target

      34.ps1

    • Size

      1KB

    • MD5

      68bddac7ac658f9f72b58f984399756f

    • SHA1

      f424b6c82945ddb068f8f7bc2f6ff2a72f5bf2d9

    • SHA256

      cec8edd890e127b429f7801501f8637036048ca6f2d3c64b2c4d64f2168b07fd

    • SHA512

      cb56d4642ec4cf77a96c059094cc9261a7136bdce4c313dcacae6e94db6e320dafb9be5498e33524315a21fc0d10a4c7d663b3bd096957c773df7de9c34d8d98

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks