General

  • Target

    6ca5c9a22c5917d0a429c64601bdc9014425ec20463e2a90c1c1a7317e397c9e

  • Size

    133KB

  • Sample

    230116-l33yvahc2s

  • MD5

    a553660e5b394a22559411a0d6a28a4d

  • SHA1

    aea7bdff430275fe4b383d79a63fe749b4386ba1

  • SHA256

    fb1ffaae3a51951679c5b7734fd07895e2b29088a3d6437f7f3acd3fbf6386f4

  • SHA512

    d5360a6181082c2dd55f560c045d3cbe041de4975fdaeb7b18831bd530ad1151ccf8d48f7024fd5bc118f71ca6205aa0cad831f2ec29fdc5015093aa4f78c2e4

  • SSDEEP

    3072:3NJ+uwfiiAs/PnQssLG0PPCm8RylCnOjuzncezc/qS0CXd9gtO:3u9fRrQsa8QsnXzbzc/qS0CN9J

Malware Config

Extracted

Family

lumma

C2

77.73.134.68

Targets

    • Target

      6ca5c9a22c5917d0a429c64601bdc9014425ec20463e2a90c1c1a7317e397c9e

    • Size

      210KB

    • MD5

      6a0c02d75b060ef9fee6cb9c6d6d2a7d

    • SHA1

      686f49a408d80ef700393a2ccf523c1a7223f1b4

    • SHA256

      6ca5c9a22c5917d0a429c64601bdc9014425ec20463e2a90c1c1a7317e397c9e

    • SHA512

      cc1513c8f17bfa152a036be33e1cfeca00dfc6af297c793463e8160af65e242f7b8998ea0ee1947cecf75f82b50930da02395ffa6a0cbdc61ff5c652c8ecdaca

    • SSDEEP

      3072:PYXWECROUQJd5/oOe7Q3hC8CnOjuzncezcX69i:PstUQnekEnXzbzcq

    • Detects Smokeloader packer

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks