General

  • Target

    iobit_driver_booster_pro_12.3.0.549.exe

  • Size

    30.3MB

  • Sample

    250410-tave1awve1

  • MD5

    e7928ac7321f52222aad50d030e057a0

  • SHA1

    bb4277c6abd5e01b6305f4471a36944a9df81a4d

  • SHA256

    2520320628e80aec559e88bd6bbced61bf24d8337fce0d362cdfb7124776765a

  • SHA512

    fa3d6d503520d802eac43b5cb34e12f3b9a548ea0cd43a466f9b2acacb22eb1935e79a6ed4a2d88036aad19ff900965c18fc3a1b218bb000c2087d1fe7a56ea8

  • SSDEEP

    393216:FBZ/61AdYctyiyeaQBOqbAmAYVVTA2hqM1/L20qisgxP6anvR9h:FT6aYctXaQBfJAYcM1DfsgxPb

Malware Config

Extracted

Family

lumma

C2

https://changeaie.top/geps

https://soursopsf.run/gsoiao

https://easyupgw.live/eosz

https://hliftally.top/xasj

https://upmodini.digital/gokk

https://salaccgfa.top/gsooz

https://zestmodp.top/zeda

https://xcelmodo.run/nahd

Targets

    • Target

      iobit_driver_booster_pro_12.3.0.549.exe

    • Size

      30.3MB

    • MD5

      e7928ac7321f52222aad50d030e057a0

    • SHA1

      bb4277c6abd5e01b6305f4471a36944a9df81a4d

    • SHA256

      2520320628e80aec559e88bd6bbced61bf24d8337fce0d362cdfb7124776765a

    • SHA512

      fa3d6d503520d802eac43b5cb34e12f3b9a548ea0cd43a466f9b2acacb22eb1935e79a6ed4a2d88036aad19ff900965c18fc3a1b218bb000c2087d1fe7a56ea8

    • SSDEEP

      393216:FBZ/61AdYctyiyeaQBOqbAmAYVVTA2hqM1/L20qisgxP6anvR9h:FT6aYctXaQBfJAYcM1DfsgxPb

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v16

Tasks