General

  • Target

    random.exe

  • Size

    1.8MB

  • Sample

    250410-xh4v7azwet

  • MD5

    bffbbfe4af975a31b952ddc5692a9643

  • SHA1

    4f6f66dfa048e2b1159f293f7201a5bb79c65d80

  • SHA256

    a7df2d900d037b68ef0e22a1b3885dd94181189106517a576a6cce3556c15c61

  • SHA512

    c40317145ca768f126a7c9d26be1e2001386aa7199a72950e59ec5c562380dfb7929c44c234cba66504cb783b69038b52e3171e8e639b5ec424caa5b4e1639fd

  • SSDEEP

    49152:eZ/DFU1EnbkOKJKWWgN95A/RGPPXCYuZQSo4v:4FqsZKYy58GnX1NS

Malware Config

Extracted

Family

lumma

C2

https://dclarmodq.top/qoxo

https://soursopsf.run/gsoiao

https://changeaie.top/geps

https://3easyupgw.live/eosz

https://mliftally.top/xasj

https://upmodini.digital/gokk

https://salaccgfa.top/gsooz

https://mzestmodp.top/zeda

https://xcelmodo.run/nahd

Targets

    • Target

      random.exe

    • Size

      1.8MB

    • MD5

      bffbbfe4af975a31b952ddc5692a9643

    • SHA1

      4f6f66dfa048e2b1159f293f7201a5bb79c65d80

    • SHA256

      a7df2d900d037b68ef0e22a1b3885dd94181189106517a576a6cce3556c15c61

    • SHA512

      c40317145ca768f126a7c9d26be1e2001386aa7199a72950e59ec5c562380dfb7929c44c234cba66504cb783b69038b52e3171e8e639b5ec424caa5b4e1639fd

    • SSDEEP

      49152:eZ/DFU1EnbkOKJKWWgN95A/RGPPXCYuZQSo4v:4FqsZKYy58GnX1NS

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v16

Tasks