General

  • Target

    Software.exe

  • Size

    383KB

  • Sample

    250125-rzfxssxjds

  • MD5

    275f280e497b54f976aafa8d6fd75c30

  • SHA1

    2c59a3d801cd680698669c9949460e51b7a502e8

  • SHA256

    26c01eac6d4f9b9ddbcd8c175d8945f148228ffd0b1d782612d6b22deba599dd

  • SHA512

    14e4ed3583ebf98d348554c5b62193e1acdba088fe7fb0de72fc36d787123122fc6d65d6284af69b6b7008490c609b2e45666991cbe547f6cdf15b7fbf679a76

  • SSDEEP

    6144:KahOjJKvALumXD9nJiWKdFpMcvEI7WyZcGxFWkp:Ki28mXPKdFpMcvEIFCGx/p

Malware Config

Extracted

Family

lumma

C2

https://toppyneedus.biz/api

Targets

    • Target

      Software.exe

    • Size

      383KB

    • MD5

      275f280e497b54f976aafa8d6fd75c30

    • SHA1

      2c59a3d801cd680698669c9949460e51b7a502e8

    • SHA256

      26c01eac6d4f9b9ddbcd8c175d8945f148228ffd0b1d782612d6b22deba599dd

    • SHA512

      14e4ed3583ebf98d348554c5b62193e1acdba088fe7fb0de72fc36d787123122fc6d65d6284af69b6b7008490c609b2e45666991cbe547f6cdf15b7fbf679a76

    • SSDEEP

      6144:KahOjJKvALumXD9nJiWKdFpMcvEI7WyZcGxFWkp:Ki28mXPKdFpMcvEIFCGx/p

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks