General

  • Target

    3.vxe

  • Size

    272.8MB

  • Sample

    230315-c4n2msbb22

  • MD5

    e1650154f43f22c30dcc7747cf3a0214

  • SHA1

    294597ff8866da3afaebfaa103c0facadd4f7bde

  • SHA256

    ea5df7769b590ecbc46bf007da26019d68886f78974bec90132b791e4ff083cc

  • SHA512

    f3f03e38b92212f0a3423799c2b5b56a57dfa5f773c94b83e229aba6a320cd4714339789294f927084d2b7a2e575bd3a3ef9f59bfbacbc8551689af041ab22d4

  • SSDEEP

    6291456:ZajYp8MDPxAXw9w0ETZjBpfc6cXv6dNjJH+Z69yxk+w4tDSTalWgMNF3wW:Z3LJAXmETFzc6c/67JO69tWSwWgMZ

Malware Config

Targets

    • Target

      3.vxe

    • Size

      272.8MB

    • MD5

      e1650154f43f22c30dcc7747cf3a0214

    • SHA1

      294597ff8866da3afaebfaa103c0facadd4f7bde

    • SHA256

      ea5df7769b590ecbc46bf007da26019d68886f78974bec90132b791e4ff083cc

    • SHA512

      f3f03e38b92212f0a3423799c2b5b56a57dfa5f773c94b83e229aba6a320cd4714339789294f927084d2b7a2e575bd3a3ef9f59bfbacbc8551689af041ab22d4

    • SSDEEP

      6291456:ZajYp8MDPxAXw9w0ETZjBpfc6cXv6dNjJH+Z69yxk+w4tDSTalWgMNF3wW:Z3LJAXmETFzc6c/67JO69tWSwWgMZ

    • Detected google phishing page

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks