General

  • Target

    2025-05-17_c11d7890166c0ba59bc63031343ffa44_agent-tesla_amadey_black-basta_cobalt-strike_darkgate_elex_luca-stealer

  • Size

    938KB

  • Sample

    250517-r1583svnv8

  • MD5

    c11d7890166c0ba59bc63031343ffa44

  • SHA1

    ebadeaf2a2cb9e8fa43a73bd65067ad2e8776af5

  • SHA256

    da15432bd0bd2e0764e774a749390ba61bd94af44768168e5f7863239642551f

  • SHA512

    5cfc223cf1a1d37a525896e919b62a3701f84a05b7daf2f7d5fa2d24e3b21aa0806c9763c5c9d088fa1f4fb78f67da41a2b274fe5f4633fc79431ddbeca6ab2a

  • SSDEEP

    24576:tqDEvCTbMWu7rQYlBQcBiT6rprG8aweb:tTvC/MTQYxsWR7awe

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.156.72.2/testmine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.156.72.2/testmine/random.exe

Extracted

Family

lumma

C2

https://6racxilb.digital/ozi

https://narrathfpt.top/tekq

https://jackthyfuc.run/xpas

https://onehunqpom.life/zpxd

https://laminaflbx.shop/twoq

https://dovercovtcg.top/juhd

https://blackswmxc.top/bgry

https://posseswsnc.top/akds

https://featurlyin.top/pdal

https://ninepicchf.bet/lznd

https://uvoznessxyy.life/bnaz

https://zmedtipp.live/mnvzx

https://interpwthc.digital/juab

https://clatteqrpq.digital/kljz

https://overcovtcg.top/juhd

https://blackljjwc.run/banj

https://meteorplyp.live/lekp

https://flowerexju.bet/lanz

https://easterxeen.run/zavc

https://araucahkbm.live/baneb

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.156.72.2/testmine/random.exe

Targets

    • Target

      2025-05-17_c11d7890166c0ba59bc63031343ffa44_agent-tesla_amadey_black-basta_cobalt-strike_darkgate_elex_luca-stealer

    • Size

      938KB

    • MD5

      c11d7890166c0ba59bc63031343ffa44

    • SHA1

      ebadeaf2a2cb9e8fa43a73bd65067ad2e8776af5

    • SHA256

      da15432bd0bd2e0764e774a749390ba61bd94af44768168e5f7863239642551f

    • SHA512

      5cfc223cf1a1d37a525896e919b62a3701f84a05b7daf2f7d5fa2d24e3b21aa0806c9763c5c9d088fa1f4fb78f67da41a2b274fe5f4633fc79431ddbeca6ab2a

    • SSDEEP

      24576:tqDEvCTbMWu7rQYlBQcBiT6rprG8aweb:tTvC/MTQYxsWR7awe

    • Detects Rhadamanthys payload

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Rhadamanthys family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Looks for VirtualBox Guest Additions in registry

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to execute payload.

    • Downloads MZ/PE file

    • Looks for VMWare Tools registry key

    • Possible privilege escalation attempt

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks

OSZAR »