General

  • Target

    ebn banco-1979.7z

  • Size

    12.8MB

  • Sample

    250305-s2ryhsslt7

  • MD5

    b9580f1f46e41d23e690285da92eff30

  • SHA1

    c3105a96e7f3119415236b36139a4f82bfa4f8b8

  • SHA256

    3fcf8ff7401f7871a6877ae7b8293bdf607030607e1b10d7930b56cf02eef4ca

  • SHA512

    1e43049c477e4b540f44bef27f493062a9861e60e4556ef053a010bff1b409d60f7c7e7d9f51088e35bfd046ea89b779da468dd4dd47c996393b4cf0776fb26c

  • SSDEEP

    393216:bC5bVoqEqO3gQMbDwrGRyyDTTTcrOgVBZ:bC5buqEqcg/blrcrJ3

Malware Config

Extracted

Family

lumma

C2

https://theorxhysics.shop/api

Targets

    • Target

      ebn banco.exe

    • Size

      784.4MB

    • MD5

      bdf2aa6823c193d8e1bc95f152cc28ab

    • SHA1

      3f10e54411029ff7b4b32440cbd9414bbbd831c4

    • SHA256

      79cfaf5728e4296f69963eb5fe954914323d86a81fe8bcabfd3b67b5a3fc1032

    • SHA512

      76b37dbd007b2da721414e7a7facea65b910fd18277c2d34f9a5af44efa8c3ea989c567b03c09c486790dfacd5ca85293d8bc4fb0dd67a76d9bc4040f93cb0b8

    • SSDEEP

      393216:iVAMZgKqBeEkPEgTPi1ps/zG73h/udI3Ke4tAqYft90SZd+cPO/oj:G33YptIAT4o

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks