General

  • Target

    file.exe

  • Size

    206KB

  • Sample

    230115-qwslrafd53

  • MD5

    24f41ccbbb9934a5261c8e389b3f9270

  • SHA1

    e01722da03588b0ade8c4092567213075822e2ed

  • SHA256

    2a28b6bba07b7fb9cb5015b56ff34e29e81c2c8c7ac99a1273b7e53263641733

  • SHA512

    f737a17c7cedbfa939f78523f103d53c79f2924ec81fa2eea162344c44fdf3b2d4a08e6519dbc76b7154ad94492b40a30a0ef1e6f746616b3d59c8f44532ecd0

  • SSDEEP

    3072:UXGOpC634wAI5/Us06dvGhXFZ6Q+uXfVpdi:QKdwGs1+9yut

Malware Config

Extracted

Family

lumma

C2

77.73.134.68

Targets

    • Target

      file.exe

    • Size

      206KB

    • MD5

      24f41ccbbb9934a5261c8e389b3f9270

    • SHA1

      e01722da03588b0ade8c4092567213075822e2ed

    • SHA256

      2a28b6bba07b7fb9cb5015b56ff34e29e81c2c8c7ac99a1273b7e53263641733

    • SHA512

      f737a17c7cedbfa939f78523f103d53c79f2924ec81fa2eea162344c44fdf3b2d4a08e6519dbc76b7154ad94492b40a30a0ef1e6f746616b3d59c8f44532ecd0

    • SSDEEP

      3072:UXGOpC634wAI5/Us06dvGhXFZ6Q+uXfVpdi:QKdwGs1+9yut

    • Detects Smokeloader packer

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

MITRE ATT&CK Enterprise v6

Tasks