General

  • Target

    Launcher.exe.v

  • Size

    159.9MB

  • Sample

    240919-re2zjascnh

  • MD5

    507455dc75794137428258d5a8837f13

  • SHA1

    d8ece2a90df0c43ead1fb5554d32ff125b3dc67e

  • SHA256

    c7006f1cc5746837246964f5a39c218c7a6d81800423feef490604280cce859e

  • SHA512

    fc31ccb7038317ceaa9369cbb516f5a269eaa20f44f59dba12777f5f750b1960ab420a6bcad83ae1b8887e72865d0103f65110f16b76b29f81e92a1d13bf3bcc

  • SSDEEP

    786432:7bEXI3NVNnPmVvJpXPzvgBoZWSifGwdEnTtLwSTRpf4P1wT1EnaZImYES:7gWN3M7v75wG8FElYD

Malware Config

Extracted

Family

stealc

Botnet

mainteam

C2

http://95.182.96.50

Attributes
  • url_path

    /2aced82320799c96.php

Extracted

Family

lumma

C2

https://samledwwekspzxp.shop/api

https://genedjestytw.shop/api

Targets

    • Target

      Launcher.exe.v

    • Size

      159.9MB

    • MD5

      507455dc75794137428258d5a8837f13

    • SHA1

      d8ece2a90df0c43ead1fb5554d32ff125b3dc67e

    • SHA256

      c7006f1cc5746837246964f5a39c218c7a6d81800423feef490604280cce859e

    • SHA512

      fc31ccb7038317ceaa9369cbb516f5a269eaa20f44f59dba12777f5f750b1960ab420a6bcad83ae1b8887e72865d0103f65110f16b76b29f81e92a1d13bf3bcc

    • SSDEEP

      786432:7bEXI3NVNnPmVvJpXPzvgBoZWSifGwdEnTtLwSTRpf4P1wT1EnaZImYES:7gWN3M7v75wG8FElYD

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Stealc

      Stealc is an infostealer written in C++.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks