General

  • Target

    Synapse Launcher.exe

  • Size

    787KB

  • Sample

    230331-yf2tgsec4z

  • MD5

    334175a89a5a82a7011b1a545a7db01f

  • SHA1

    9a4863ad30b66796eccfdad453658f62886a6245

  • SHA256

    0666cc1ee4d34bc0f386d67e4a8306eb50ac9ff22d9b2b407a90f256e79a2ee3

  • SHA512

    af085b6b9c5308329411349debf5997585a73fdad09eb239536f74ba1f8b0c0f80bc1010e08bfeb1b3e83ad129e6c5a77d86398ceda86b712be1062d5d004bfe

  • SSDEEP

    6144:oZokZ36h3AJIzpcRIjkoxEHrevwgQpLPCBhcJah8A/qlu1sYFz6ktJ3MxFZ4azWO:o+kGkoqdpeBiJM1bFz6egFZEZSepJ

Malware Config

Targets

    • Target

      Synapse Launcher.exe

    • Size

      787KB

    • MD5

      334175a89a5a82a7011b1a545a7db01f

    • SHA1

      9a4863ad30b66796eccfdad453658f62886a6245

    • SHA256

      0666cc1ee4d34bc0f386d67e4a8306eb50ac9ff22d9b2b407a90f256e79a2ee3

    • SHA512

      af085b6b9c5308329411349debf5997585a73fdad09eb239536f74ba1f8b0c0f80bc1010e08bfeb1b3e83ad129e6c5a77d86398ceda86b712be1062d5d004bfe

    • SSDEEP

      6144:oZokZ36h3AJIzpcRIjkoxEHrevwgQpLPCBhcJah8A/qlu1sYFz6ktJ3MxFZ4azWO:o+kGkoqdpeBiJM1bFz6egFZEZSepJ

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

6
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

5
T1082

Peripheral Device Discovery

1
T1120

Tasks