General
-
Target
https://github.com/Shopify/polaris/discussions/13580
-
Sample
250508-tg6rlsgj4x
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Shopify/polaris/discussions/13580
Resource
win11-20250502-en
Malware Config
Extracted
lumma
https://parakehjet.run/kewk
https://geographys.run/eirq
https://woodpeckersd.run/glsk
https://tropiscbs.live/iuwxx
https://cbuzzarddf.live/ktnt
https://biosphxere.digital/tqoa
https://7bearjk.live/benj
Targets
-
-
Target
https://github.com/Shopify/polaris/discussions/13580
-
Lumma family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Defense Evasion
Access Token Manipulation
1Create Process with Token
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1