Resubmissions

28/02/2025, 06:16

250228-g1mrmatqw4 10

28/02/2025, 06:14

250228-gzfxpasyfw 10

General

  • Target

    [2]-Caption_Motion-1.zip

  • Size

    15.9MB

  • Sample

    250228-g1mrmatqw4

  • MD5

    aedb8645e7ff555e772b3a4b0f9aaf5f

  • SHA1

    6374b193e304e428346002606c74575cbde7923e

  • SHA256

    39de3bc40e97290cf1b0cf6bc898a40bf977f727821052c158fab29bd877747d

  • SHA512

    f447a85740e2de2d0edc09edfacf85e95c93d7ce80cdf1ec95588c03b3e8e57ecfaeaa3da144dc325e5678cae3d892a0cb97a016120fbf22ef626b457a1105f0

  • SSDEEP

    393216:91mCfw/tWxx4q+CsFplzkHFYEm2FKwQqGevj9Scfh:913fw/tWxl+B1kHZmsK4GeL9ScJ

Malware Config

Extracted

Family

lumma

C2

https://uprootquincju.shop/api

Targets

    • Target

      Captiva.exe

    • Size

      7.0MB

    • MD5

      8b7343c22fb99c26da8f3122c6cecdcd

    • SHA1

      898ebaa6ae8293f24306475ea5029520a1533dbc

    • SHA256

      fd37270bdce8937cc3cb0d4d99300f537daba57e70f36f40e4c767411f7938cd

    • SHA512

      8d806c124656ebdf151f92ce9bb6024cb2fe17a5dafeb90c0ceff783c6e8c9044f00bc846727465f64f79946096d60d81d2434ae6cb05b6a18aee5bc05e4ba81

    • SSDEEP

      98304:c3d8QkJDJ3m0R1yQXvCyCE28yW1cadMykTmERn50gxIbgSZtwzn05A4tcqQVIhvQ:p+0ncq/aDDWqR

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks