General

  • Target

    2025-03-30_5adcf9918838e95aa439ddcc4217c8e1_black-basta_cobalt-strike_satacom

  • Size

    3.9MB

  • Sample

    250330-rrve8azzg1

  • MD5

    5adcf9918838e95aa439ddcc4217c8e1

  • SHA1

    8ae5c3de8cb1e9788bdd2a09e840b31348cd76c0

  • SHA256

    636e55648c9d3fc08bc814e01765f34e71db576aef5397e16e6498d3a7ee7f7e

  • SHA512

    cc48b85171edd62861f4eca49980e9353e8f0a65fdcec9f34928ce8f7e1bfbef932c28cdbcf2aa1f0c53490affd6d87c1fb5d7a62cb29e02fd924e797db15352

  • SSDEEP

    98304:zziZpcTIjmxUPjRJjPmEriDJbg5ajTd806/x/rMsr:zzqGMfeEmDJM5andZ6J/Asr

Malware Config

Extracted

Family

lumma

C2

https://starjetv.run/GPazo

https://koreheatq.live/gsopp

https://castmaxw.run/ganzde

https://weldorae.digital/geds

https://steelixr.live/aguiz

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://smeltingt.run/giiaus

https://ferromny.digital/gwpd

Extracted

Family

cryptbot

C2

http://home.sixbb6mn.top/jTNyqiIkTqrjLPexvdad174

Targets

    • Target

      2025-03-30_5adcf9918838e95aa439ddcc4217c8e1_black-basta_cobalt-strike_satacom

    • Size

      3.9MB

    • MD5

      5adcf9918838e95aa439ddcc4217c8e1

    • SHA1

      8ae5c3de8cb1e9788bdd2a09e840b31348cd76c0

    • SHA256

      636e55648c9d3fc08bc814e01765f34e71db576aef5397e16e6498d3a7ee7f7e

    • SHA512

      cc48b85171edd62861f4eca49980e9353e8f0a65fdcec9f34928ce8f7e1bfbef932c28cdbcf2aa1f0c53490affd6d87c1fb5d7a62cb29e02fd924e797db15352

    • SSDEEP

      98304:zziZpcTIjmxUPjRJjPmEriDJbg5ajTd806/x/rMsr:zzqGMfeEmDJM5andZ6J/Asr

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Modifies visiblity of hidden/system files in Explorer

    • Enumerates VirtualBox registry keys

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks