General

  • Target

    ETool.zip

  • Size

    1.6MB

  • Sample

    250410-v2wb2syjw9

  • MD5

    43f8cc5a00d8872c42946d2a4ae4e4c4

  • SHA1

    6491e9caa3de159d226229224ed06961477485c8

  • SHA256

    c31fcf4ae345721271c1d64da659787b620ae9da29d9f80cf175a4bcafcc060d

  • SHA512

    86b2b36b47e8e5d96f9346d8b34b2c997f60536a29e4c95519059c0232fbb5fb10d0a2bc781f5892de7f0fa3b2fdb3cb4fb7b85fc1df2a16ded2bbafa24360b1

  • SSDEEP

    49152:dYHNCRQhD4P0orIEGeStYtjeTWf+38f8S:dYtgU/KIlifIG8S

Malware Config

Extracted

Family

lumma

C2

https://infuzoriatufelka.com/api

https://soursopsf.run/gsoiao

https://changeaie.top/geps

https://easyupgw.live/eosz

https://liftally.top/xasj

https://upmodini.digital/gokk

https://salaccgfa.top/gsooz

https://zestmodp.top/zeda

https://xcelmodo.run/nahd

Targets

    • Target

      ETool.exe

    • Size

      127.0MB

    • MD5

      9201fd8086ed6252d3fd04426a89aca6

    • SHA1

      ef2439d69b10217304d86f1d0a084a3525a2bf59

    • SHA256

      2327e82bad470c955053d011b1b23481b16ace2a30ac1ec655d5ac457213d0cf

    • SHA512

      eb6102d67f9d8067d62dfba0127669491a215fd2b4470c16a4cd90d499c09be594856da2a14d3d31c71ee8254d3dc46e8ecfcc8570c6111aa19edfb49b3675dc

    • SSDEEP

      24576:10aVFANlrs0kwTD+r0DyheNjEmqj4tC8yjarmo8nf+Z82vIW9:1mNipwTD+r0+hiEmE4tCtjar0f+Z8vW9

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v16

Tasks