Add 87.120.115.240 - lumma stealer - malware #726
Merged
+21
−0
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Phishing Domain/URL/IP(s):
Impersonated domain
Describe the issue
tg.-frumos-hcl-nr.-75-1.pdf.lnk
-> Wmic -> powershell iex -> Mshta ->https://80.76.51.231/Samarik
| powershell ->https://80.76.51.231/Kompass-4.1.2.exe
I found a malicious .lnk file that contains the following:
The second stage is a powershell script containing:
The first 1376 characters of $ddg are the encrypted data and the remaining characters are the AES encryption key.
$apj.IV = New-Object byte[] 16;
sets the IV to 16 bytes of zeros. After decryption we are left with:We can further deobfuscate the second stage to:
The second stage downloads
https://80.76.51.231/Kompass-4.1.2.exe
and saves the file in AppData. Kompass-4.1.2.exe is detected by multiple engines as a variant of lumma stealer. We can enumerate a list of C2 domains through dynamic analysis.Related external source
https://urlscan.io/result/ed1f38e2-1ba5-4149-b291-2002a19ec221/
https://app.any.run/tasks/dfa9206b-71f9-43ee-8b7f-94765e95bb19
https://www.virustotal.com/gui/domain/tripeggyun.fun/relations
https://www.virustotal.com/gui/domain/processhol.sbs/relations
https://www.virustotal.com/gui/domain/librari-night.sbs/relations
https://www.virustotal.com/gui/domain/befall-sm0ker.sbs/relations
https://www.virustotal.com/gui/domain/p10tgrace.sbs/relations
https://www.virustotal.com/gui/domain/peepburry828.sbs/relations
https://www.virustotal.com/gui/domain/owner-vacat10n.sbs/relations
https://www.virustotal.com/gui/domain/3xp3cts1aim.sbs/relations
https://www.virustotal.com/gui/domain/p3ar11fter.sbs/relations
https://www.virustotal.com/gui/file/bb2e14bb962873722f1fd132ff66c4afd2f7dc9b6891c746d697443c0007426a/details
https://www.virustotal.com/gui/url/6cf2009de72b333ff30e3ca4166e51db2c844c180d9df7302ea6aaa1ea63d2f7/details
https://www.virustotal.com/gui/url/1598c1362dde4fb5800bab7005148f50342e1f308a04bddb79c58ad5cb59e591/details
https://urlscan.io/search/#page.domain%3A87.120.115.240
https://urlscan.io/search/#page.domain%3A80.76.51.231
Screenshot
Click to expand