General

  • Target

    18dc8fac237e8cb22397fe44f64c54863b4ed5f490042d759689d149856b8dd3

  • Size

    133KB

  • Sample

    230116-kcfj7aga7z

  • MD5

    ba10897989cc6232f77991df150d458c

  • SHA1

    b3429bbf69a1d51359866f580a4f1301d0542403

  • SHA256

    cc7d98da7930799936b4d026ea13e2d5023faa9b26f97b482662d5dab138cc4d

  • SHA512

    a40cc211422f599e1c2da5f94eb9085601e7c15df554f3eacc42beead42099ed211c3d8e6143a2c2c754a313bfae0f267fe717fbcb221b25b23c0e3495be7163

  • SSDEEP

    3072:ZA/Ln4/q9SiZzDXueT1xjSM62CxYXSsYcDyGwZ/:ZA/s3iBeo62CxYXS2i9

Malware Config

Extracted

Family

lumma

C2

77.73.134.68

Targets

    • Target

      18dc8fac237e8cb22397fe44f64c54863b4ed5f490042d759689d149856b8dd3

    • Size

      210KB

    • MD5

      ebd42ae578479719653b35c33554ccc5

    • SHA1

      da79aceadb98f5198c218438e1ff13900b206ec9

    • SHA256

      18dc8fac237e8cb22397fe44f64c54863b4ed5f490042d759689d149856b8dd3

    • SHA512

      0eaf3f62705ddab16e14a077bc29c52b22a99dd9b2212dcd0aeec9d92843b79b65bdde3b14a9170fc424aace760a6c80970916547039fa697814e7be639c1f12

    • SSDEEP

      1536:gMQuk7EPCnpn2XcxezpkQYCPt9ldnXEp6Zd5X581Z1EnVx7C0NDuYHCx3IkwLuTy:gMXWEo+/hd5p73762CxYXSNti

    • Detects Smokeloader packer

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks