General

  • Target

    32f7fa32fafc74bb0b26089e37a7fde1.exe

  • Size

    8.0MB

  • Sample

    250415-sd3p4swlt5

  • MD5

    32f7fa32fafc74bb0b26089e37a7fde1

  • SHA1

    f608bb9d9ba24bc86db2436e612bb84f31be2e97

  • SHA256

    c5308205d4d84ddc2a96194fcc509522ada976c3f5ee60e4208008ede1935359

  • SHA512

    1f31bdced9547fe0a29357b182a9a74e951ecefa17122d978e78cde6b1ea5b1cdf58f902508869f5590955cd23501e92aa0aac216226afed08c33655e02302d7

  • SSDEEP

    98304:IT5sez3ygCjCjSmJNb/KyVdBAJ1Jbho2a6FmI3oqmG:IyeDycSmJNb//rMJbI6P3e

Malware Config

Extracted

Family

gcleaner

C2

185.156.73.98

45.91.200.135

Extracted

Family

lumma

C2

https://proenhann.digital/thnb

https://jawdedmirror.run/ewqd

https://changeaie.top/geps

https://lonfgshadow.live/xawi

https://liftally.top/xasj

https://nighetwhisper.top/lekd

https://salaccgfa.top/gsooz

https://zestmodp.top/zeda

https://owlflright.digital/qopy

Targets

    • Target

      32f7fa32fafc74bb0b26089e37a7fde1.exe

    • Size

      8.0MB

    • MD5

      32f7fa32fafc74bb0b26089e37a7fde1

    • SHA1

      f608bb9d9ba24bc86db2436e612bb84f31be2e97

    • SHA256

      c5308205d4d84ddc2a96194fcc509522ada976c3f5ee60e4208008ede1935359

    • SHA512

      1f31bdced9547fe0a29357b182a9a74e951ecefa17122d978e78cde6b1ea5b1cdf58f902508869f5590955cd23501e92aa0aac216226afed08c33655e02302d7

    • SSDEEP

      98304:IT5sez3ygCjCjSmJNb/KyVdBAJ1Jbho2a6FmI3oqmG:IyeDycSmJNb//rMJbI6P3e

    • Detect Socks5Systemz Payload

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • Gcleaner family

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to execute payload.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks