Resubmissions

06-10-2024 16:39

241006-t56frayblh 10

06-10-2024 16:36

241006-t4j65ayaqa 8

General

  • Target

    nigger-cheat.exe

  • Size

    6.2MB

  • Sample

    241006-t56frayblh

  • MD5

    70fcc9a9d3e2025e73f1990a4520f224

  • SHA1

    dd245b304a144b57b022662fd8996c74ed41f591

  • SHA256

    31f1d523058b0d54d92891739a2ce64f240db3e696b74faba0450e44e756e9b4

  • SHA512

    f637d23529d8b056cc8a7a3a9467670cb81a4772ea4160a891423d5959b86b7402fc855372ce05c8e92b5d29a8e41c6d5ae246613a628b6ea861a08cd2ba6608

  • SSDEEP

    98304:2pwpHyly42uW5MI0mleFahftplflf6dUwOEH6d8e6aSpXqG0youVkHcOj/to:wSHvzL2VmlTNfwZHYYaSEWouVCVp

Malware Config

Extracted

Family

lumma

Targets

    • Target

      nigger-cheat.exe

    • Size

      6.2MB

    • MD5

      70fcc9a9d3e2025e73f1990a4520f224

    • SHA1

      dd245b304a144b57b022662fd8996c74ed41f591

    • SHA256

      31f1d523058b0d54d92891739a2ce64f240db3e696b74faba0450e44e756e9b4

    • SHA512

      f637d23529d8b056cc8a7a3a9467670cb81a4772ea4160a891423d5959b86b7402fc855372ce05c8e92b5d29a8e41c6d5ae246613a628b6ea861a08cd2ba6608

    • SSDEEP

      98304:2pwpHyly42uW5MI0mleFahftplflf6dUwOEH6d8e6aSpXqG0youVkHcOj/to:wSHvzL2VmlTNfwZHYYaSEWouVCVp

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks