Resubmissions

31/03/2025, 20:39

250331-zfkewazqs3 10

31/03/2025, 20:25

250331-y7dkzaxwg1 10

31/03/2025, 20:23

250331-y55lnsxwez 4

General

  • Target

    https://coconnexion.com/comcat.zip?&audio=623

  • Sample

    250331-y7dkzaxwg1

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

https://anaamw.com/p3.php

Extracted

Family

lumma

C2

https://cosmozya.digital/AISuzo

https://byteplusx.digital/aXweAX

https://travewlio.shop/ZNxbHi

https://skynetxc.live/AksoPA

https://opixtreev.run/LkaUz

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://7sparkiob.digital/KeASUp

https://appgridn.live/LEjdAK

Targets

    • Target

      https://coconnexion.com/comcat.zip?&audio=623

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks