General

  • Target

    setup.zip

  • Size

    3.5MB

  • Sample

    250210-fvey6aslew

  • MD5

    be5be64179498c920d691c0e4a23d492

  • SHA1

    0e7d456ae344b53f29472afc06adea17c01a8a56

  • SHA256

    6d2b4898ccd8f8a653c46c625f2f97be34b215266656ec14d756b5d387bb70ef

  • SHA512

    1693f96cdb3f32015981b51472b5b7aea57c9290d4149e1c398fefbf4996ec99bdfa8cb6c3d3ef8bb612d4d40f090dbe731907f344ec6a35b7933cba922db90c

  • SSDEEP

    98304:U+3VmoKTWJYXiAkZMiS/1uq1p4ArFiqVbw0Wwkh0:UcCTLicuq1vrlVlWN0

Malware Config

Extracted

Family

lumma

C2

https://insrpiringcommunity.click/api

Targets

    • Target

      setup.exe

    • Size

      684.0MB

    • MD5

      a28cdc3698f9ee1b75c804480cf228f3

    • SHA1

      b0b12c025e829062eeaa166649ca6ebaa1b4e3ac

    • SHA256

      6b523706b0012c420a93519d246586d3b19e845b9b3736adf61e973ed059870b

    • SHA512

      be51f3bdeabc3332dd6555655012a7bb0aae1c5c42999bb66bed888bba48181b9d2bdd434f2b5c3dca0bb277e68ed1d08af818451f9ad17665ca0da88b21bda7

    • SSDEEP

      49152:RdSZ4HDQNJL0VR6SgMt+k4RiP+RmXMjiINiMq95FoHVHNTQTEjT333TYqlvIB:euHDYsqiPRhINnq95FoHVBT333TVd+

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Downloads MZ/PE file

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks