General

  • Target

    https://mega.nz/folder/SQ4BWbBB#fAN-0OThrJOUdQL-8mb7TA

  • Sample

    250410-12p3xstshx

Malware Config

Extracted

Family

lumma

C2

https://revitmodh.run/pzaw

https://dsoursopsf.run/gsoiao

https://changeaie.top/geps

https://easyupgw.live/eosz

https://rliftally.top/xasj

https://upmodini.digital/gokk

https://salaccgfa.top/gsooz

https://zestmodp.top/zeda

https://ixcelmodo.run/nahd

Targets

    • Target

      https://mega.nz/folder/SQ4BWbBB#fAN-0OThrJOUdQL-8mb7TA

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Creates new service(s)

    • Event Triggered Execution: Image File Execution Options Injection

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v16

Tasks