General

  • Target

    kythkkaewdth.exe

  • Size

    1.3MB

  • Sample

    250315-s9d2ma1kx9

  • MD5

    1c0c000ecfad8fa57d732f81a30aa76f

  • SHA1

    0021566536c370465140a630c4702eae5fda5e78

  • SHA256

    f95645a33e5ecc3cf6c61a5121769995e2f50807fa48740c6bc02f745aa66195

  • SHA512

    e94a9c7f2a4b306017dd6a01b684acf3b6ac6dca776b9eef3f6dcdec8d24f757331a22e620bed63bef759a59ea05ff92fc7c86521effa9cea269111845d88557

  • SSDEEP

    24576:oCZZ2UpYQF+OIahGuffWJzIET30y1ew03AlZFge3yyklNhGW9VLCeCj2:oCZZZg8GuHWJEETFd1zFkJl/tdCf2

Malware Config

Extracted

Family

lumma

C2

https://bugildbett.top/api

https://crosshairc.life/api

https://mrodularmall.top/api

https://jowinjoinery.icu/api

https://legenassedk.top/api

https://htardwarehu.icu/api

https://cjlaspcorne.icu/api

https://weaponrywo.digital/api

Targets

    • Target

      kythkkaewdth.exe

    • Size

      1.3MB

    • MD5

      1c0c000ecfad8fa57d732f81a30aa76f

    • SHA1

      0021566536c370465140a630c4702eae5fda5e78

    • SHA256

      f95645a33e5ecc3cf6c61a5121769995e2f50807fa48740c6bc02f745aa66195

    • SHA512

      e94a9c7f2a4b306017dd6a01b684acf3b6ac6dca776b9eef3f6dcdec8d24f757331a22e620bed63bef759a59ea05ff92fc7c86521effa9cea269111845d88557

    • SSDEEP

      24576:oCZZ2UpYQF+OIahGuffWJzIET30y1ew03AlZFge3yyklNhGW9VLCeCj2:oCZZZg8GuHWJEETFd1zFkJl/tdCf2

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks