General

  • Target

    !!@NeW_$etUp_2024_pAsSW0rds$_.exe

  • Size

    13.7MB

  • Sample

    240403-hjmkzaac21

  • MD5

    b1cb85d0689f64c6373345fc6b084f5f

  • SHA1

    9901c71cf849f77161732f1ab9631b111fd00753

  • SHA256

    94ab177cc62af8c0fa1d2a0be6575db5bde69a52d126293e6a7fe5c01607597d

  • SHA512

    3a2751b43a725fa436907156f3976a93eaebbcaa93eb3118f35ceb7268cd9f3a5037f8b02216dde58fdf6e766a728fbf8db5668f67dd3225342e1411e83f2f51

  • SSDEEP

    393216:uPUByGBdf6xy5DEs5Rr7+EVrwRGJvxPjVHs+i2sUC8RS:uPkyGBdIy5DIEqY3M3T

Malware Config

Extracted

Family

lumma

C2

https://marchsensedjurkey.shop/api

Targets

    • Target

      !!@NeW_$etUp_2024_pAsSW0rds$_.exe

    • Size

      13.7MB

    • MD5

      b1cb85d0689f64c6373345fc6b084f5f

    • SHA1

      9901c71cf849f77161732f1ab9631b111fd00753

    • SHA256

      94ab177cc62af8c0fa1d2a0be6575db5bde69a52d126293e6a7fe5c01607597d

    • SHA512

      3a2751b43a725fa436907156f3976a93eaebbcaa93eb3118f35ceb7268cd9f3a5037f8b02216dde58fdf6e766a728fbf8db5668f67dd3225342e1411e83f2f51

    • SSDEEP

      393216:uPUByGBdf6xy5DEs5Rr7+EVrwRGJvxPjVHs+i2sUC8RS:uPkyGBdIy5DIEqY3M3T

    • Detect ZGRat V1

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks