General

  • Target

    synapse-v2-launcher-12-5-22.zip

  • Size

    351KB

  • Sample

    230419-yqj2esfa4v

  • MD5

    b03b887ae392b6f33fad562becfc0482

  • SHA1

    101c2388c16ca7678a8426739ec7a1b505a6f6aa

  • SHA256

    93db5f4e53b9c0514b9c0c4c562be8d8e7c3d64f8542c03b7e7f032a9c5d0c55

  • SHA512

    0c1cd2e1f5c32b76aa8c994b6399acf81c6f9e2558e120d2eefcde9628a162fa4c3c74aae519a59640f49ee6ca1a33f3faeeaea5e8c02aef9749af0c74d4dc73

  • SSDEEP

    6144:tIYeWfLyWEuLGqsdGNNG5cbM8b1O+cy8xHZ/Lm/nukJxxUO3atM/bc1TEia:tyW5EuKwNNyOHc9xHZy/nVtUOL+T4

Malware Config

Targets

    • Target

      synapse-v2-launcher-12-5-22.zip

    • Size

      351KB

    • MD5

      b03b887ae392b6f33fad562becfc0482

    • SHA1

      101c2388c16ca7678a8426739ec7a1b505a6f6aa

    • SHA256

      93db5f4e53b9c0514b9c0c4c562be8d8e7c3d64f8542c03b7e7f032a9c5d0c55

    • SHA512

      0c1cd2e1f5c32b76aa8c994b6399acf81c6f9e2558e120d2eefcde9628a162fa4c3c74aae519a59640f49ee6ca1a33f3faeeaea5e8c02aef9749af0c74d4dc73

    • SSDEEP

      6144:tIYeWfLyWEuLGqsdGNNG5cbM8b1O+cy8xHZ/Lm/nukJxxUO3atM/bc1TEia:tyW5EuKwNNyOHc9xHZy/nVtUOL+T4

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks