General

  • Target

    file.exe

  • Size

    210KB

  • Sample

    230115-23dxqahd9w

  • MD5

    ce451955535418248a9feb81919eaea7

  • SHA1

    59aaa858df7edaa7acbc2ab3f52b6bbc75d39132

  • SHA256

    427a731f8acc1eb9d60201a31b6fd2ff72d64f57feb31efa930f754eb086c1dd

  • SHA512

    83a5dc330e5077b1f06b58432a3432a90ef47f8c5be76ed7db4309f8182c12aaa6a482d99941965819ea6e0a2a97416a2f3604618b9b0af92ef6aca22961ad6b

  • SSDEEP

    3072:sSXWpvlld5Sorzlz3fXcJswKE+34qGCqxYKhfi:sSUwoNGH6GC

Malware Config

Extracted

Family

lumma

C2

77.73.134.68

Targets

    • Target

      file.exe

    • Size

      210KB

    • MD5

      ce451955535418248a9feb81919eaea7

    • SHA1

      59aaa858df7edaa7acbc2ab3f52b6bbc75d39132

    • SHA256

      427a731f8acc1eb9d60201a31b6fd2ff72d64f57feb31efa930f754eb086c1dd

    • SHA512

      83a5dc330e5077b1f06b58432a3432a90ef47f8c5be76ed7db4309f8182c12aaa6a482d99941965819ea6e0a2a97416a2f3604618b9b0af92ef6aca22961ad6b

    • SSDEEP

      3072:sSXWpvlld5Sorzlz3fXcJswKE+34qGCqxYKhfi:sSUwoNGH6GC

    • Detects Smokeloader packer

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks