General
-
Target
6b37c5347754c31bd9aa8b946410b71da1b74a777480839b378d748cfbce2210.exe
-
Size
1.8MB
-
Sample
241218-c5ymga1jgp
-
MD5
cd0ac63bd2ece29fe4ab3ae30df60d15
-
SHA1
a9e3659ed1d331406a9bd7826b334df47b7a39e1
-
SHA256
6b37c5347754c31bd9aa8b946410b71da1b74a777480839b378d748cfbce2210
-
SHA512
9e14a59a590378a854c0262ccc34883583fb8176f71fb843ad05e18fab340e0957b73b83357630a9112d150253ac9f187e3edc56d2e1e58f80aea6e1dde5d941
-
SSDEEP
24576:NQLO6ijXHg33UUyRRc6EAARJmWRURspriuai9cbmMo612OZpAIgrUMGfUN/yNNfb:NcLWi3UN/v0URQiuncYROZvKgEe1n
Static task
static1
Behavioral task
behavioral1
Sample
6b37c5347754c31bd9aa8b946410b71da1b74a777480839b378d748cfbce2210.exe
Resource
win7-20241023-en
Malware Config
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
6b37c5347754c31bd9aa8b946410b71da1b74a777480839b378d748cfbce2210.exe
-
Size
1.8MB
-
MD5
cd0ac63bd2ece29fe4ab3ae30df60d15
-
SHA1
a9e3659ed1d331406a9bd7826b334df47b7a39e1
-
SHA256
6b37c5347754c31bd9aa8b946410b71da1b74a777480839b378d748cfbce2210
-
SHA512
9e14a59a590378a854c0262ccc34883583fb8176f71fb843ad05e18fab340e0957b73b83357630a9112d150253ac9f187e3edc56d2e1e58f80aea6e1dde5d941
-
SSDEEP
24576:NQLO6ijXHg33UUyRRc6EAARJmWRURspriuai9cbmMo612OZpAIgrUMGfUN/yNNfb:NcLWi3UN/v0URQiuncYROZvKgEe1n
-
Lumma family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
2Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3