General

  • Target

    170e174a0818f7dc9a2827203fa9984fb5cbf40fe89075209ef603921e422ac0

  • Size

    207KB

  • Sample

    230115-sdfwcagc32

  • MD5

    2629d882824682177464316e08824077

  • SHA1

    da1863d4aff251dba95f4946b415a9121d6e2293

  • SHA256

    170e174a0818f7dc9a2827203fa9984fb5cbf40fe89075209ef603921e422ac0

  • SHA512

    7af0d515f89ace2b0daa15c3a7e7d0aeedf4d54f060a844cdd7b166dcc00ad86e759576e95db825f66ecbcba769f165b6ba45f37ad886296ffa2932a82a9a9ab

  • SSDEEP

    3072:vXq0Xp3Xj7I5DJQm5CaEdM2Eqdmr/asXxSynRYei:fBjieachdo/DXxdRY

Malware Config

Extracted

Family

lumma

C2

77.73.134.68

Targets

    • Target

      170e174a0818f7dc9a2827203fa9984fb5cbf40fe89075209ef603921e422ac0

    • Size

      207KB

    • MD5

      2629d882824682177464316e08824077

    • SHA1

      da1863d4aff251dba95f4946b415a9121d6e2293

    • SHA256

      170e174a0818f7dc9a2827203fa9984fb5cbf40fe89075209ef603921e422ac0

    • SHA512

      7af0d515f89ace2b0daa15c3a7e7d0aeedf4d54f060a844cdd7b166dcc00ad86e759576e95db825f66ecbcba769f165b6ba45f37ad886296ffa2932a82a9a9ab

    • SSDEEP

      3072:vXq0Xp3Xj7I5DJQm5CaEdM2Eqdmr/asXxSynRYei:fBjieachdo/DXxdRY

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Email Collection

2
T1114

Tasks