General
-
Target
https://mega.nz/folder/SQ4BWbBB#fAN-0OThrJOUdQL-8mb7TA
-
Sample
250410-12p3xstshx
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/folder/SQ4BWbBB#fAN-0OThrJOUdQL-8mb7TA
Resource
win10v2004-20250410-en
Malware Config
Extracted
lumma
https://revitmodh.run/pzaw
https://dsoursopsf.run/gsoiao
https://changeaie.top/geps
https://easyupgw.live/eosz
https://rliftally.top/xasj
https://upmodini.digital/gokk
https://salaccgfa.top/gsooz
https://zestmodp.top/zeda
https://ixcelmodo.run/nahd
Targets
-
-
Target
https://mega.nz/folder/SQ4BWbBB#fAN-0OThrJOUdQL-8mb7TA
-
Lumma family
-
Creates new service(s)
-
Event Triggered Execution: Image File Execution Options Injection
-
Stops running service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3