General

  • Target

    2024-10-10_4bfca9446cb278626b58b350b9e1bc23_poet-rat_snatch

  • Size

    7.5MB

  • Sample

    241010-lcqktssgne

  • MD5

    4bfca9446cb278626b58b350b9e1bc23

  • SHA1

    ea4f13440b077c269e283e287ab62109dac1d109

  • SHA256

    081634559a7ed65e960a55fd4f1fa40245df7188a33def2f6e1d70f2cafc8c87

  • SHA512

    ed4dc98f711b3e1777bad905534489b613516afaf5194801e942104b610622d348cd0d3bff04b80b29e56de52066c2bc0f44a7545985a3a93c6db311ad8cfd36

  • SSDEEP

    98304:InKDMH5cGESXimKgrVGEOhMePfxfMGWO76lIQ:ZMH5+KkrfM1O7t

Malware Config

Extracted

Family

lumma

C2

https://drawwyobstacw.sbs

https://condifendteu.sbs

https://ehticsprocw.sbs

https://vennurviot.sbs

https://resinedyw.sbs

https://enlargkiw.sbs

https://allocatinow.sbs

https://mathcucom.sbs

Extracted

Family

stealc

Botnet

mainteam

C2

http://95.182.96.50

Attributes
  • url_path

    /2aced82320799c96.php

Targets

    • Target

      2024-10-10_4bfca9446cb278626b58b350b9e1bc23_poet-rat_snatch

    • Size

      7.5MB

    • MD5

      4bfca9446cb278626b58b350b9e1bc23

    • SHA1

      ea4f13440b077c269e283e287ab62109dac1d109

    • SHA256

      081634559a7ed65e960a55fd4f1fa40245df7188a33def2f6e1d70f2cafc8c87

    • SHA512

      ed4dc98f711b3e1777bad905534489b613516afaf5194801e942104b610622d348cd0d3bff04b80b29e56de52066c2bc0f44a7545985a3a93c6db311ad8cfd36

    • SSDEEP

      98304:InKDMH5cGESXimKgrVGEOhMePfxfMGWO76lIQ:ZMH5+KkrfM1O7t

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Stealc

      Stealc is an infostealer written in C++.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks