General

  • Target

    cab9dddcd0cba7525c8d06829bdd3707b447dc144bb1a36d0c7e7babf351bf55

  • Size

    207KB

  • Sample

    230115-jr9wxafh8s

  • MD5

    43585233852e93cd9ddaaf22c7f8828a

  • SHA1

    a3d6fc2094fb62e9f5ca1129edaca339bde9073d

  • SHA256

    cab9dddcd0cba7525c8d06829bdd3707b447dc144bb1a36d0c7e7babf351bf55

  • SHA512

    1f5a9573553bb8448fff271b3010c6a7dc533dd65d4a60d0a1251d036731b5c24e5db4448a36f5cec5c83e9c0f590902b75198ef653cf91364005157d89147d5

  • SSDEEP

    3072:dXtvjMQjnYFeHPFLnOUA5bRmX3Utna//Iv0A/Jhag1xEn93apb:ZtNjnYFe9LnOUSmXkA//IlJxAKp

Malware Config

Extracted

Family

lumma

C2

77.73.134.68

Targets

    • Target

      cab9dddcd0cba7525c8d06829bdd3707b447dc144bb1a36d0c7e7babf351bf55

    • Size

      207KB

    • MD5

      43585233852e93cd9ddaaf22c7f8828a

    • SHA1

      a3d6fc2094fb62e9f5ca1129edaca339bde9073d

    • SHA256

      cab9dddcd0cba7525c8d06829bdd3707b447dc144bb1a36d0c7e7babf351bf55

    • SHA512

      1f5a9573553bb8448fff271b3010c6a7dc533dd65d4a60d0a1251d036731b5c24e5db4448a36f5cec5c83e9c0f590902b75198ef653cf91364005157d89147d5

    • SSDEEP

      3072:dXtvjMQjnYFeHPFLnOUA5bRmX3Utna//Iv0A/Jhag1xEn93apb:ZtNjnYFe9LnOUSmXkA//IlJxAKp

    • Detects Smokeloader packer

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks