General

  • Target

    conf.zip

  • Size

    2KB

  • Sample

    230827-2em6gsdf23

  • MD5

    f94f90824462091dc2123277582a380d

  • SHA1

    ef1d09b7e83782a547facf36fccf848482475fa3

  • SHA256

    884ef747b4d2d5475674db0544a8bd4f3dde6f4f5ae4c7523331ebcbd31d6f27

  • SHA512

    941dafb0184359b36a83405eb51a1c44ed4bffa60145b1302fbd078f6a56e84084a0f5fd553cf72b7fe5c0abfaadd8ea9fb45c3f8d40bf9505849d6c8a9d783a

Malware Config

Targets

    • Target

      data_conf.lnk

    • Size

      1KB

    • MD5

      598ea8c6f5035c7f096419da69d7a92e

    • SHA1

      1e0c9b378f5f8f80bbd67c6c46acb8a174913768

    • SHA256

      fee9c51d03cebc85b04228cb3238fe994436435f20e3628b978fd2ac8d85e03e

    • SHA512

      00d868a21f9db1a280c2c8cc3188702bc604cf459ce5218e6be2419b48e48b288e42de3a1ec20bf4895e93fa6cc8d66f6723bee3743cc2977b2a3fdc808d1179

    • Babadeda

      Babadeda is a crypter delivered as a legitimate installer and used to drop other malware families.

    • Babadeda Crypter

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Use of msiexec (install) with remote resource

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Target

      dependentlibs.list

    • Size

      1024B

    • MD5

      1e4e1ba1c75a7d251e1418f634ff7dee

    • SHA1

      7eea9ccfc87de20181f5a38631d2bce4785f9ff9

    • SHA256

      13a15c4cc399b5af5a4ec1dd2239ed1b5c7cd21283edfa6aeed33240ea977d69

    • SHA512

      08043945d1490f314ae2b9031fc35ed0f55094cd8c12af8bcc040872200a67266fd534fd768aa8cef9576fe6138b37f4181bd2405a57b54fb23d5281e59fee55

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks