General

  • Target

    WEXTRACT.EXE.exe

  • Size

    1.2MB

  • Sample

    231226-a87y7sfhgr

  • MD5

    0461b9006f7b6f44c4aa98014261111b

  • SHA1

    a638bf91943e362b7877572a969537d19f4225e9

  • SHA256

    233fdd885db94f2bf61ecf71049c5bce72378edcec5e65f824422052922f394c

  • SHA512

    8d4c17690fdbfebf74f6de5d139ab97a6315beb0f56b9ea4e03631466adb37f574bb3f288203233c082db1e6987d5d039b86c9b71f732e3e6a968c29473b4656

  • SSDEEP

    24576:Dyh0uyvSOe52xiS4tIuRIt44ACyiLYZNpygdVfU2:Wex3e8xiSkCt44AGijygXf

Malware Config

Targets

    • Target

      WEXTRACT.EXE.exe

    • Size

      1.2MB

    • MD5

      0461b9006f7b6f44c4aa98014261111b

    • SHA1

      a638bf91943e362b7877572a969537d19f4225e9

    • SHA256

      233fdd885db94f2bf61ecf71049c5bce72378edcec5e65f824422052922f394c

    • SHA512

      8d4c17690fdbfebf74f6de5d139ab97a6315beb0f56b9ea4e03631466adb37f574bb3f288203233c082db1e6987d5d039b86c9b71f732e3e6a968c29473b4656

    • SSDEEP

      24576:Dyh0uyvSOe52xiS4tIuRIt44ACyiLYZNpygdVfU2:Wex3e8xiSkCt44AGijygXf

    • Detect Lumma Stealer payload V4

    • Detected google phishing page

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks