General

  • Target

    15833f92c23ba3afbba0f4f273274452.exe

  • Size

    2.4MB

  • Sample

    241101-3jtz9svmgt

  • MD5

    15833f92c23ba3afbba0f4f273274452

  • SHA1

    f9f68f691644f7be60128ede3005699e7d6f4941

  • SHA256

    7aa7c19de5eaa2409006038a7d0d7423dd0c7d9b3d9514ffb8d790e4fdc51d2c

  • SHA512

    cfe3e16c91e9013c259dcd52527bc458d33b568459995238d8356abf4bb2438a425aa01d517f0ca16e096b80114e6af234dde43cc4ce082f75163f52660f1690

  • SSDEEP

    49152:vslBubuANjnMenjn+TH2dfdWVOm+C8tNPd1Zyiu+vbFxqiedJBBmUdP:vslgb9lMkhd1WYmpktd1ZDvbTqRfBrdP

Malware Config

Extracted

Family

warzonerat

C2

162.230.48.189:56001

Extracted

Family

lumma

C2

https://goalyfeastz.site/api

https://contemteny.site/api

https://dilemmadu.site/api

https://authorisev.site/api

Targets

    • Target

      15833f92c23ba3afbba0f4f273274452.exe

    • Size

      2.4MB

    • MD5

      15833f92c23ba3afbba0f4f273274452

    • SHA1

      f9f68f691644f7be60128ede3005699e7d6f4941

    • SHA256

      7aa7c19de5eaa2409006038a7d0d7423dd0c7d9b3d9514ffb8d790e4fdc51d2c

    • SHA512

      cfe3e16c91e9013c259dcd52527bc458d33b568459995238d8356abf4bb2438a425aa01d517f0ca16e096b80114e6af234dde43cc4ce082f75163f52660f1690

    • SSDEEP

      49152:vslBubuANjnMenjn+TH2dfdWVOm+C8tNPd1Zyiu+vbFxqiedJBBmUdP:vslgb9lMkhd1WYmpktd1ZDvbTqRfBrdP

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks