General

  • Target

    f4f147d270e98a7598f02362ddd2f927.exe

  • Size

    3.1MB

  • Sample

    230720-r5ab7shb36

  • MD5

    f4f147d270e98a7598f02362ddd2f927

  • SHA1

    c79df640b839d8fb01ede7d91c397212a3e1da0c

  • SHA256

    d0130399fd404226ae5b90897e8e3affe29b7d34081ee1bf11ecb3750ca342c5

  • SHA512

    519bf57ec999ef477b0d16af2eac6beefd2e2e50f491163f327919aa759b2aa10d0adf8e9ee23c8838cbcbb018e96943dd118b1660ecfdb41601689e1b57ff99

  • SSDEEP

    98304:FRyJKKbIFlOLLN3z71neq1VKj7J2tB5pu:FkwKbqeJ171Yj7Ep

Malware Config

Targets

    • Target

      f4f147d270e98a7598f02362ddd2f927.exe

    • Size

      3.1MB

    • MD5

      f4f147d270e98a7598f02362ddd2f927

    • SHA1

      c79df640b839d8fb01ede7d91c397212a3e1da0c

    • SHA256

      d0130399fd404226ae5b90897e8e3affe29b7d34081ee1bf11ecb3750ca342c5

    • SHA512

      519bf57ec999ef477b0d16af2eac6beefd2e2e50f491163f327919aa759b2aa10d0adf8e9ee23c8838cbcbb018e96943dd118b1660ecfdb41601689e1b57ff99

    • SSDEEP

      98304:FRyJKKbIFlOLLN3z71neq1VKj7J2tB5pu:FkwKbqeJ171Yj7Ep

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks