General

  • Target

    277f441499c1fb9ddf4d462c3b443b9e

  • Size

    4.2MB

  • Sample

    231231-epwt2sfhaj

  • MD5

    277f441499c1fb9ddf4d462c3b443b9e

  • SHA1

    5cf5da3598e4cf139f6e6ffb9a4d32e49ac9321a

  • SHA256

    05263375ffe64e8586c78e8e435007bff1f2a42684d48378eee68c07ba54a80e

  • SHA512

    0ce74ab987eaf7371f79c22afcc16e319781ee7a7fcdcd995fff402788fbaa0e132df529db6e804549556f332ad8d8828e48b7ca8b27a7da22feadc21c09f871

  • SSDEEP

    98304:pKHcMsDndy6iiHrjZE2/mkCUGP18szyTJr:w8dDlNLjpmkC/18ouJr

Malware Config

Extracted

Family

metasploit

Version

encoder/fnstenv_mov

Targets

    • Target

      277f441499c1fb9ddf4d462c3b443b9e

    • Size

      4.2MB

    • MD5

      277f441499c1fb9ddf4d462c3b443b9e

    • SHA1

      5cf5da3598e4cf139f6e6ffb9a4d32e49ac9321a

    • SHA256

      05263375ffe64e8586c78e8e435007bff1f2a42684d48378eee68c07ba54a80e

    • SHA512

      0ce74ab987eaf7371f79c22afcc16e319781ee7a7fcdcd995fff402788fbaa0e132df529db6e804549556f332ad8d8828e48b7ca8b27a7da22feadc21c09f871

    • SSDEEP

      98304:pKHcMsDndy6iiHrjZE2/mkCUGP18szyTJr:w8dDlNLjpmkC/18ouJr

    • Detect Lumma Stealer payload V4

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks