General

  • Target

    cisco_4.x_installer.msi

  • Size

    124.2MB

  • Sample

    230329-g3h68agf6z

  • MD5

    7c505e3aab5a2359ea78b1c65bbd92c1

  • SHA1

    a8c6de80c1e5072bdd097110bd9bd41d4fa336fd

  • SHA256

    96e7875d3e0134218c07b6c78da8d5a2e49008cea091c14a854fddf9fc1cec73

  • SHA512

    11f82a93e61f87a34e9b4ae9ea712337a818de1aecc349885057c54735c0094754f2322bf0967e56d6c289f0da06a198f1128b09356b9d49cb069ffd80364258

  • SSDEEP

    3145728:YFIJVEnmGgZM8KmNJTLAH0D2b/l+GBdSORE:YFA2mfZ5KmNtOnbcGBd9RE

Malware Config

Targets

    • Target

      cisco_4.x_installer.msi

    • Size

      124.2MB

    • MD5

      7c505e3aab5a2359ea78b1c65bbd92c1

    • SHA1

      a8c6de80c1e5072bdd097110bd9bd41d4fa336fd

    • SHA256

      96e7875d3e0134218c07b6c78da8d5a2e49008cea091c14a854fddf9fc1cec73

    • SHA512

      11f82a93e61f87a34e9b4ae9ea712337a818de1aecc349885057c54735c0094754f2322bf0967e56d6c289f0da06a198f1128b09356b9d49cb069ffd80364258

    • SSDEEP

      3145728:YFIJVEnmGgZM8KmNJTLAH0D2b/l+GBdSORE:YFA2mfZ5KmNtOnbcGBd9RE

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks