General

  • Target

    42b3ab0b27fbcb1aebd765f8673659bc4474f218f2109fffd167bd80b0d25c9e

  • Size

    207KB

  • Sample

    230115-d5y4nsdd4y

  • MD5

    d9c239d1809017a6cf0114686cba3fcf

  • SHA1

    a4768bff068507476a4b54e19be9ad0ef15b53e5

  • SHA256

    42b3ab0b27fbcb1aebd765f8673659bc4474f218f2109fffd167bd80b0d25c9e

  • SHA512

    151ffc4e8afa6bf6fab692745e2b0199e05a87c5d2b43274ba69d02ef7db04d1b31895ca1206a9c1df13ad6dc1f4e1d6272bfd5c7f3f635de8391f669b1c0e4b

  • SSDEEP

    3072:EXwFN2C+tulvztr5lJRmELFyuFOd6MA9xCOw7Sapb:AxC+tuxtjLUuFO+9kvp

Malware Config

Extracted

Family

lumma

C2

77.73.134.68

Targets

    • Target

      42b3ab0b27fbcb1aebd765f8673659bc4474f218f2109fffd167bd80b0d25c9e

    • Size

      207KB

    • MD5

      d9c239d1809017a6cf0114686cba3fcf

    • SHA1

      a4768bff068507476a4b54e19be9ad0ef15b53e5

    • SHA256

      42b3ab0b27fbcb1aebd765f8673659bc4474f218f2109fffd167bd80b0d25c9e

    • SHA512

      151ffc4e8afa6bf6fab692745e2b0199e05a87c5d2b43274ba69d02ef7db04d1b31895ca1206a9c1df13ad6dc1f4e1d6272bfd5c7f3f635de8391f669b1c0e4b

    • SSDEEP

      3072:EXwFN2C+tulvztr5lJRmELFyuFOd6MA9xCOw7Sapb:AxC+tuxtjLUuFO+9kvp

    • Detects Smokeloader packer

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks