General

  • Target

    ⚝彡𝒮et-𝕌𝔭__8569‥…❣Ꭾ𝕒$$ℭ0𝓓𝓔☆.7z

  • Size

    3.7MB

  • Sample

    250212-rwqb3awjat

  • MD5

    207abdfe7d55d2ed6bf6ef162b551b19

  • SHA1

    2ec4e4af77b95ee2a416f19fb52269ceee5668ab

  • SHA256

    a83cb75995c565ee3256f9314d82359cfee8765608d913178c1c28e353f70de1

  • SHA512

    23842f12b698c463eed6ac6a1bbecc31799bde44a6c40ac958a709c0138412b2f20254c555e5d25766bcbee31412298cfe1a721292323181e940c25a2de7918a

  • SSDEEP

    49152:f+9xqwU/+s69xWYk9T07y0RqS5sdyHHqu+Mf2A8QP2k6irZ/wYcnIPPbT3xXj8J1:UxigxWJAGSjHq/MfpLeIJbTBAJOeCRo

Malware Config

Extracted

Family

lumma

C2

https://calfmhaven.cyou/api

Targets

    • Target

      Get__File𝔃/setup.exe

    • Size

      697.3MB

    • MD5

      32f57bd28256571f9802a594d310c987

    • SHA1

      a0c047b57c554aeae98a5cd1990f5e8eec03f740

    • SHA256

      6c25f32e6e5f179833a56b8872a487f416597565bd1f4976fea154ad0071ae43

    • SHA512

      591f8890093f7fc3fca1a01f82d84e0d7f7420736cb7fafcab1b6e50b2ac28f0c0f726847ba72f0da219dc4275b13362ad1b007977b1b327e29fdc37a2d7b15e

    • SSDEEP

      98304:SpaOTEikjpnQ1Ow/V0vkFVuvRHyqP4wVrozQ3:Sp9IVNR3ww5

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks