General

  • Target

    Lumma Stealer Maybe.exe

  • Size

    253KB

  • Sample

    250118-1l7b9svrht

  • MD5

    9424aeef4f651d0095a030ac62cb6d69

  • SHA1

    f786413759d9b494ab6171287e35761c8de8e6c3

  • SHA256

    b2fa57d22603a564e0f4627183d573ce747213d1ce30eff5e97bb9cae93add63

  • SHA512

    a16b1854d69046779933bd641044fbcdf1e710c6cf1d674094829de51095af85a01870aa28eeebf2fa440155268731674121cc4bafbc3d6d64f24059457b6a1a

  • SSDEEP

    1536:3sFWgCR8ZPMhcNi1ptY8353R6L5p1nuxzpSFdaYPh3Uj3NDq0EajVMyh9F5:kORbPR6L5pg+dBuNWnGMyh9r

Malware Config

Extracted

Family

xworm

C2

boiko300-55617.portmap.host:55617

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    svchost.exe

Targets

    • Target

      Lumma Stealer Maybe.exe

    • Size

      253KB

    • MD5

      9424aeef4f651d0095a030ac62cb6d69

    • SHA1

      f786413759d9b494ab6171287e35761c8de8e6c3

    • SHA256

      b2fa57d22603a564e0f4627183d573ce747213d1ce30eff5e97bb9cae93add63

    • SHA512

      a16b1854d69046779933bd641044fbcdf1e710c6cf1d674094829de51095af85a01870aa28eeebf2fa440155268731674121cc4bafbc3d6d64f24059457b6a1a

    • SSDEEP

      1536:3sFWgCR8ZPMhcNi1ptY8353R6L5p1nuxzpSFdaYPh3Uj3NDq0EajVMyh9F5:kORbPR6L5pg+dBuNWnGMyh9r

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks