General

  • Target

    94df69dfe27e1b3da2ecee9169c4e075c213d1e94cebb534ac65ea5093e3d513

  • Size

    210KB

  • Sample

    230115-vsyqtahe74

  • MD5

    e4579885cf59fe9bc9a42f26a54b6e83

  • SHA1

    f4365fae65d6c29079eae9cc03e1a3f5b4559fba

  • SHA256

    94df69dfe27e1b3da2ecee9169c4e075c213d1e94cebb534ac65ea5093e3d513

  • SHA512

    b85c099e04d5fe018d0e9c8623994a8929cca61ce1aca412f09f1dc4faf24d54d3db5b9bf3404721fbdab7ba2b3cefaeb3fb388a9623fce7655192cd89e43e71

  • SSDEEP

    3072:TXWhFVbRR3ns515T9Z08rSZ8WtYtS5i2gyGaDH9Zk/0DTEi:L+Ea8m+WWtAiMJDH3

Malware Config

Extracted

Family

lumma

C2

77.73.134.68

Targets

    • Target

      94df69dfe27e1b3da2ecee9169c4e075c213d1e94cebb534ac65ea5093e3d513

    • Size

      210KB

    • MD5

      e4579885cf59fe9bc9a42f26a54b6e83

    • SHA1

      f4365fae65d6c29079eae9cc03e1a3f5b4559fba

    • SHA256

      94df69dfe27e1b3da2ecee9169c4e075c213d1e94cebb534ac65ea5093e3d513

    • SHA512

      b85c099e04d5fe018d0e9c8623994a8929cca61ce1aca412f09f1dc4faf24d54d3db5b9bf3404721fbdab7ba2b3cefaeb3fb388a9623fce7655192cd89e43e71

    • SSDEEP

      3072:TXWhFVbRR3ns515T9Z08rSZ8WtYtS5i2gyGaDH9Zk/0DTEi:L+Ea8m+WWtAiMJDH3

    • Detects Smokeloader packer

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

MITRE ATT&CK Enterprise v6

Tasks