General

  • Target

    2. CCleaner.Professional.6.06.10144.exe

  • Size

    49.6MB

  • Sample

    230329-c57kdaee22

  • MD5

    c80f2122f4755d8035d54e853d0d4ca2

  • SHA1

    ba1c08614d713545be84e1229df09eb6275f0223

  • SHA256

    2d071818c4530a76a0cf946fa7dc00a1d2bba95a741962802c4b8b23d54a319c

  • SHA512

    f4285e0530a5cec0f2e294ea0b47a45cce9919782c37efca30567092bdd024f3a26b973aa340101ad3d935076af5458b72c2306d684e2a6199fbbda77cd41358

  • SSDEEP

    1572864:kY3EH/GNT2kFLiWijs9jI3tF8+vMZEU0CYJYtK:kYUfgCGi5jsk8QyYJYtK

Malware Config

Targets

    • Target

      2. CCleaner.Professional.6.06.10144.exe

    • Size

      49.6MB

    • MD5

      c80f2122f4755d8035d54e853d0d4ca2

    • SHA1

      ba1c08614d713545be84e1229df09eb6275f0223

    • SHA256

      2d071818c4530a76a0cf946fa7dc00a1d2bba95a741962802c4b8b23d54a319c

    • SHA512

      f4285e0530a5cec0f2e294ea0b47a45cce9919782c37efca30567092bdd024f3a26b973aa340101ad3d935076af5458b72c2306d684e2a6199fbbda77cd41358

    • SSDEEP

      1572864:kY3EH/GNT2kFLiWijs9jI3tF8+vMZEU0CYJYtK:kYUfgCGi5jsk8QyYJYtK

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Bootkit

1
T1067

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

7
T1012

System Information Discovery

6
T1082

Security Software Discovery

1
T1063

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks