General

  • Target

    #Pa$$CŌ𝔻e--6814__OpeN-Setup$#.7z

  • Size

    4.1MB

  • Sample

    250212-rtbqwsvras

  • MD5

    7dd2b82801c77b3d607207533067f354

  • SHA1

    fda6c021200f5af116c1f3591faee685c6851227

  • SHA256

    099e05c8887f9ed9f2a386680e74f70c88f84e27b1aba24cc4076d462341e52f

  • SHA512

    421ebc1262e59815631c98c28484947a5ece64d1fc9f93142c41cb3f031e7459dcd3c42c79bfc9f9b91e8b700e8edbd7702b90b1c2b1c69ec56234f0c6e8aeb3

  • SSDEEP

    98304:XUAd+6Zqh9EKiDO1/OnUAogWvAgimQ7UED1lKU:EAIWqX0s/+Uri77dv5

Malware Config

Extracted

Family

lumma

C2

https://brixghtquest.cyou/api

Targets

    • Target

      setup.exe

    • Size

      697.3MB

    • MD5

      383fa62b776e9a987e3487d3adb712dd

    • SHA1

      2002e387d4eebe5fcfc44faba49c353331f30450

    • SHA256

      62e6fc53e8a929fe7e8000e613bdd50917dd0ef303c5cace46a65ceb6a495b8b

    • SHA512

      65ee4a72ec06540f4aa350f672fda31e507e66e49ca3b75bc761b044e144371f6a3d76430ea60847518c67458531e017864565b96f27686511a6773995255dfe

    • SSDEEP

      98304:PpaOTEikjpnQ1Ow/V0vkFVuvRHyqP4wLR:Pp9IVNR3wwL

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks