General

  • Target

    2025-05-08_85bc7f02cec175bea7e72b93823725ca_frostygoop_hijackloader_knight_luca-stealer_poet-rat_sliver_snatch

  • Size

    9.4MB

  • Sample

    250508-nrsd3ssrz8

  • MD5

    85bc7f02cec175bea7e72b93823725ca

  • SHA1

    553e10db2546ac14af83c2867f26df42cf8e3c9c

  • SHA256

    49c3626b86a498a0346f3cac6ea95a9e320a5cbeca75491ff6fd64ea12b5211b

  • SHA512

    384d9b504b2a8becda50b12ce4b15b9b17bf894bed9e4344a7d98c8238e97e19b63f0abbea17e36ba12d0ac12b4dac30b242ec52f83fe98bf8504d92372dd34e

  • SSDEEP

    196608:GhvYp8xv9NID47mF49WPNcLXko2Vx/6eg:GhC8VYs7mu9iqbkoy/E

Malware Config

Extracted

Family

lumma

C2

https://improvxf.run/kobe

https://voznessxyy.life/bnaz

https://insidegrah.run/ieop

https://homewappzb.top/tqba

https://clatteqrpq.digital/kljz

https://descenrugb.bet/woap

https://grizzlqzuk.live/qhbu

https://ninepicchf.bet/lznd

https://snakejh.top/adsk

Targets

    • Target

      2025-05-08_85bc7f02cec175bea7e72b93823725ca_frostygoop_hijackloader_knight_luca-stealer_poet-rat_sliver_snatch

    • Size

      9.4MB

    • MD5

      85bc7f02cec175bea7e72b93823725ca

    • SHA1

      553e10db2546ac14af83c2867f26df42cf8e3c9c

    • SHA256

      49c3626b86a498a0346f3cac6ea95a9e320a5cbeca75491ff6fd64ea12b5211b

    • SHA512

      384d9b504b2a8becda50b12ce4b15b9b17bf894bed9e4344a7d98c8238e97e19b63f0abbea17e36ba12d0ac12b4dac30b242ec52f83fe98bf8504d92372dd34e

    • SSDEEP

      196608:GhvYp8xv9NID47mF49WPNcLXko2Vx/6eg:GhC8VYs7mu9iqbkoy/E

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v16

Tasks

OSZAR »