General

  • Target

    2024-10-10_71885d64a99f852752f10a610d6323f8_poet-rat_snatch

  • Size

    7.5MB

  • Sample

    241010-bmqngatble

  • MD5

    71885d64a99f852752f10a610d6323f8

  • SHA1

    3fd47f10f4b3aaafa78be32c7acc1607a8eedf0b

  • SHA256

    47eadd0c65fedb7357abe72ab7f69a3fe50f409cecda40008e3b267df069f2f0

  • SHA512

    6de24fcabbe7a9329de3703dc689b587a9622a72d3be803bd169295968da6e950eb11f9fdeadf330239473fd85b3d7d2cb16fe313b40d338dde9bc4a70cf7bd1

  • SSDEEP

    98304:STjTJ+nOLBEt7imKJk/aNZSVFRMIIHgZa4x:Sl+nO+dIYFRMzAZ

Malware Config

Extracted

Family

lumma

C2

https://drawwyobstacw.sbs

https://condifendteu.sbs

https://ehticsprocw.sbs

https://vennurviot.sbs

https://resinedyw.sbs

https://enlargkiw.sbs

https://allocatinow.sbs

https://mathcucom.sbs

Extracted

Family

stealc

Botnet

mainteam

C2

http://95.182.96.50

Attributes
  • url_path

    /2aced82320799c96.php

Targets

    • Target

      2024-10-10_71885d64a99f852752f10a610d6323f8_poet-rat_snatch

    • Size

      7.5MB

    • MD5

      71885d64a99f852752f10a610d6323f8

    • SHA1

      3fd47f10f4b3aaafa78be32c7acc1607a8eedf0b

    • SHA256

      47eadd0c65fedb7357abe72ab7f69a3fe50f409cecda40008e3b267df069f2f0

    • SHA512

      6de24fcabbe7a9329de3703dc689b587a9622a72d3be803bd169295968da6e950eb11f9fdeadf330239473fd85b3d7d2cb16fe313b40d338dde9bc4a70cf7bd1

    • SSDEEP

      98304:STjTJ+nOLBEt7imKJk/aNZSVFRMIIHgZa4x:Sl+nO+dIYFRMzAZ

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Stealc

      Stealc is an infostealer written in C++.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks