General

  • Target

    2024-10-10_ef73612f46c61d7042f63d9818879d0f_poet-rat_snatch

  • Size

    7.5MB

  • Sample

    241010-mez3qatekd

  • MD5

    ef73612f46c61d7042f63d9818879d0f

  • SHA1

    0801aac8254f2ec234f4fb6e181d60ae39fd1021

  • SHA256

    b59de93972a43adb45d38fb3df5cf87735dccaac41a351cdfc09e3660642486c

  • SHA512

    30ff2583a13103bf00e412dd543181fe709eea2037cbd385fae2096962e43406264491302e1f37b7a4a74c3739436046201f0a3162fa3c502305869f47b7bb9d

  • SSDEEP

    98304:oNF2OZV+MaTsEPLMmRwjNn/Wi9l5VrAZrwE3Io:onV+MW+NPzrA9

Malware Config

Extracted

Family

lumma

C2

https://drawwyobstacw.sbs

https://condifendteu.sbs

https://ehticsprocw.sbs

https://vennurviot.sbs

https://resinedyw.sbs

https://enlargkiw.sbs

https://allocatinow.sbs

https://mathcucom.sbs

Extracted

Family

stealc

Botnet

mainteam

C2

http://95.182.96.50

Attributes
  • url_path

    /2aced82320799c96.php

Targets

    • Target

      2024-10-10_ef73612f46c61d7042f63d9818879d0f_poet-rat_snatch

    • Size

      7.5MB

    • MD5

      ef73612f46c61d7042f63d9818879d0f

    • SHA1

      0801aac8254f2ec234f4fb6e181d60ae39fd1021

    • SHA256

      b59de93972a43adb45d38fb3df5cf87735dccaac41a351cdfc09e3660642486c

    • SHA512

      30ff2583a13103bf00e412dd543181fe709eea2037cbd385fae2096962e43406264491302e1f37b7a4a74c3739436046201f0a3162fa3c502305869f47b7bb9d

    • SSDEEP

      98304:oNF2OZV+MaTsEPLMmRwjNn/Wi9l5VrAZrwE3Io:onV+MW+NPzrA9

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Stealc

      Stealc is an infostealer written in C++.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks