General

  • Target

    2025-05-17_cb08cdb70d3cbb05e986986a5d5b2ad9_agent-tesla_amadey_black-basta_cobalt-strike_darkgate_elex_luca-stealer

  • Size

    938KB

  • Sample

    250517-r4tz8ahm8t

  • MD5

    cb08cdb70d3cbb05e986986a5d5b2ad9

  • SHA1

    b0a62c59b3617ceef82144f90b88370cce67af03

  • SHA256

    0a4d8f36219df1c6be376c937bbfacf6485159a25f2f716716bff670314fef4f

  • SHA512

    17f31084c00c98fb0650ac1d4ec051f2fc21907b479e7d387e467c04ffad0fa6f1d4af4b746a80962c5031586b7221483483f3417e07ce116cea275b08a7c6ff

  • SSDEEP

    24576:HqDEvCTbMWu7rQYlBQcBiT6rprG8aM8b:HTvC/MTQYxsWR7aM8

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.156.72.2/testmine/random.exe

Extracted

Family

lumma

C2

https://6racxilb.digital/ozi

https://narrathfpt.top/tekq

https://jackthyfuc.run/xpas

https://onehunqpom.life/zpxd

https://laminaflbx.shop/twoq

https://dovercovtcg.top/juhd

https://blackswmxc.top/bgry

https://posseswsnc.top/akds

https://featurlyin.top/pdal

https://ninepicchf.bet/lznd

https://uvoznessxyy.life/bnaz

https://zmedtipp.live/mnvzx

https://interpwthc.digital/juab

https://clatteqrpq.digital/kljz

https://overcovtcg.top/juhd

https://blackljjwc.run/banj

https://meteorplyp.live/lekp

https://flowerexju.bet/lanz

https://easterxeen.run/zavc

https://araucahkbm.live/baneb

Extracted

Family

svcstealer

C2

176.113.115.149

185.81.68.156

Targets

    • Target

      2025-05-17_cb08cdb70d3cbb05e986986a5d5b2ad9_agent-tesla_amadey_black-basta_cobalt-strike_darkgate_elex_luca-stealer

    • Size

      938KB

    • MD5

      cb08cdb70d3cbb05e986986a5d5b2ad9

    • SHA1

      b0a62c59b3617ceef82144f90b88370cce67af03

    • SHA256

      0a4d8f36219df1c6be376c937bbfacf6485159a25f2f716716bff670314fef4f

    • SHA512

      17f31084c00c98fb0650ac1d4ec051f2fc21907b479e7d387e467c04ffad0fa6f1d4af4b746a80962c5031586b7221483483f3417e07ce116cea275b08a7c6ff

    • SSDEEP

      24576:HqDEvCTbMWu7rQYlBQcBiT6rprG8aM8b:HTvC/MTQYxsWR7aM8

    • Detects Rhadamanthys payload

    • Detects SvcStealer Payload

      SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Rhadamanthys family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • SvcStealer, Diamotrix

      SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.

    • Svcstealer family

    • Looks for VirtualBox Guest Additions in registry

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to execute payload.

    • Downloads MZ/PE file

    • Looks for VMWare Tools registry key

    • Possible privilege escalation attempt

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks

OSZAR »