General

  • Target

    Setup.exe

  • Size

    2.0MB

  • Sample

    250209-sbbhvavkam

  • MD5

    67cace08257e46a6ab571d7b0b9b58cb

  • SHA1

    a48fab567f9f8e821b45c00a841a6975acda7594

  • SHA256

    603ad184c98b1612294dec25a58a9cbee036ea404618910592352d7e5becfeff

  • SHA512

    efc1d582f73d050b117d96261ba7198ef3f941117395a9034ce147e1147aec7b814a6247d9f9fc5ac7122353f1d91da39e472269d898657e5a627636749ed8cf

  • SSDEEP

    49152:t5ZPhtX6eO4UP84qPuIOV1NhmUabf+W7:tht/V44uFdGbf+W7

Malware Config

Extracted

Family

lumma

C2

https://thritvingnature.click/api

Targets

    • Target

      Setup.exe

    • Size

      2.0MB

    • MD5

      67cace08257e46a6ab571d7b0b9b58cb

    • SHA1

      a48fab567f9f8e821b45c00a841a6975acda7594

    • SHA256

      603ad184c98b1612294dec25a58a9cbee036ea404618910592352d7e5becfeff

    • SHA512

      efc1d582f73d050b117d96261ba7198ef3f941117395a9034ce147e1147aec7b814a6247d9f9fc5ac7122353f1d91da39e472269d898657e5a627636749ed8cf

    • SSDEEP

      49152:t5ZPhtX6eO4UP84qPuIOV1NhmUabf+W7:tht/V44uFdGbf+W7

    • Detects Rhadamanthys payload

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Rhadamanthys family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks