General

  • Target

    b6b52463d5c5360882db5a2998016ebee2eeac8565bbe601bfc48a64a6f36fc6

  • Size

    206KB

  • Sample

    230115-eepyrahf43

  • MD5

    d3ed2aa324fd7210cf8cfe10e01614d0

  • SHA1

    9286da31e15e89fff87a7f94885c4d956ab2b314

  • SHA256

    b6b52463d5c5360882db5a2998016ebee2eeac8565bbe601bfc48a64a6f36fc6

  • SHA512

    76f5deafeb32c63366720b4a9ced89e437a4d3924d5f8894324f11eb76e0a96b6e22c608760a1681981e1a39f87ebc8f687de7bc1a82cdaa85e5828601993164

  • SSDEEP

    3072:IXtQlQYSV4saTMMJF5VA5VbG/FmapZhtlsxrXaapb:cBYSV4sJ0AcFpqp

Malware Config

Extracted

Family

lumma

C2

77.73.134.68

Targets

    • Target

      b6b52463d5c5360882db5a2998016ebee2eeac8565bbe601bfc48a64a6f36fc6

    • Size

      206KB

    • MD5

      d3ed2aa324fd7210cf8cfe10e01614d0

    • SHA1

      9286da31e15e89fff87a7f94885c4d956ab2b314

    • SHA256

      b6b52463d5c5360882db5a2998016ebee2eeac8565bbe601bfc48a64a6f36fc6

    • SHA512

      76f5deafeb32c63366720b4a9ced89e437a4d3924d5f8894324f11eb76e0a96b6e22c608760a1681981e1a39f87ebc8f687de7bc1a82cdaa85e5828601993164

    • SSDEEP

      3072:IXtQlQYSV4saTMMJF5VA5VbG/FmapZhtlsxrXaapb:cBYSV4sJ0AcFpqp

    • Detects Smokeloader packer

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks