General

  • Target

    fc163bfdeb6e36b226e816f4d.exe

  • Size

    199KB

  • Sample

    230711-vdfaxsbb3w

  • MD5

    fc163bfdeb6e36b226e816f4d58af8b6

  • SHA1

    f04406d51542af259d53990d46f31cf7068b23fc

  • SHA256

    379d1597e3930745f2652d746d6671a801390d86e16c8694e0ff46132d915aba

  • SHA512

    ce4f3b8904f70b243afd4316ccab0f7e500ba3380cd667c97156387d8d19c06a45f780b4ed5b3192acd1e9a5ae83c90bdca377571a150e1153d455eea84ca5c4

  • SSDEEP

    3072:QahKyd2n3185GWp1icKAArDZz4N9GhbkrNEk1cjhsDWCq49ET:QahOMp0yN90QE5hs6Cql

Malware Config

Targets

    • Target

      fc163bfdeb6e36b226e816f4d.exe

    • Size

      199KB

    • MD5

      fc163bfdeb6e36b226e816f4d58af8b6

    • SHA1

      f04406d51542af259d53990d46f31cf7068b23fc

    • SHA256

      379d1597e3930745f2652d746d6671a801390d86e16c8694e0ff46132d915aba

    • SHA512

      ce4f3b8904f70b243afd4316ccab0f7e500ba3380cd667c97156387d8d19c06a45f780b4ed5b3192acd1e9a5ae83c90bdca377571a150e1153d455eea84ca5c4

    • SSDEEP

      3072:QahKyd2n3185GWp1icKAArDZz4N9GhbkrNEk1cjhsDWCq49ET:QahOMp0yN90QE5hs6Cql

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks