General

  • Target

    MSlAfterburnerSetN.zip

  • Size

    55.0MB

  • Sample

    230322-shlbmabd7x

  • MD5

    288b46fe66cad2554a782285d50e2512

  • SHA1

    b24b3df8be13eb43cb8d0ac93557b3d1d543dc99

  • SHA256

    7770460af723b96b885cdc0e7b1e8a53de94b09803a56b75f4428bc124ec05ca

  • SHA512

    36315b8bd14676a3573bcf54437710418c30aacf4e4586b4ec8d3f42348f24009ba990dde5a6cb4590985e91816a5292ef672f4857d2f0ee8d59a4562322da32

  • SSDEEP

    98304:fsSpI4iC3g1IbC9I568h4aKr0ftYy4upRDLdJk:fsv4iTXlFwftYy4A5Lr

Malware Config

Targets

    • Target

      MSlAfterburnerSetN.exe

    • Size

      1106.2MB

    • MD5

      6572cd67de5dbb17be10850fa2f3d03d

    • SHA1

      64173e285196815b7c13e5e773fef93702a8a770

    • SHA256

      895456501f4c1c4b0ebbb25bc9f439aa59fc3115cf44f4ec5f548afe292866b7

    • SHA512

      55eb6bef7f65ecb7e46dde3616a3a9148f2e2176a72d74694e4960c7eb19aac9723da3d7938377fbe022c17a2013788048f79f2742809d3fe24e8376cee5b6ba

    • SSDEEP

      24576:Vc7GT2VA6+YruLD4fblEMXdTH8TzTnY9MVVTUyd8xoyh:VcM2x+YruPuXdTH8bY6VVgmE/

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

3
T1005

Tasks