General

  • Target

    file.exe

  • Size

    1.7MB

  • Sample

    241202-xvcmgatnbj

  • MD5

    c6e0ec39ca331a54c2870ab777d3b70c

  • SHA1

    082b45149478beae0c144b490e359255633b4485

  • SHA256

    a4fa892a182a9d6014788cbe01ea2793d8f02489dea9322941762302a52ba7d4

  • SHA512

    0f3f5f338b5a384980b789676fdfa2f2190dd38aef7df48403da61047ff3939add1349b4339ba39e70960cd15fa2513ef93b3b17ecf3a93d466c1c19043278e6

  • SSDEEP

    49152:vQIfitwIirA3tBZz0QD0HowyuSfFgdTXIDQ/Bv:YMitwIi03rZz8Eu62tID8B

Malware Config

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain
1
006700e5a2ab05704bbb0c589b88924d

Extracted

Family

lumma

Targets

    • Target

      file.exe

    • Size

      1.7MB

    • MD5

      c6e0ec39ca331a54c2870ab777d3b70c

    • SHA1

      082b45149478beae0c144b490e359255633b4485

    • SHA256

      a4fa892a182a9d6014788cbe01ea2793d8f02489dea9322941762302a52ba7d4

    • SHA512

      0f3f5f338b5a384980b789676fdfa2f2190dd38aef7df48403da61047ff3939add1349b4339ba39e70960cd15fa2513ef93b3b17ecf3a93d466c1c19043278e6

    • SSDEEP

      49152:vQIfitwIirA3tBZz0QD0HowyuSfFgdTXIDQ/Bv:YMitwIi03rZz8Eu62tID8B

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Modifies Windows Defender Real-time Protection settings

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.