Lumma Stealer Packed with CypherIt Distributed Using Falcon Sensor Update Phishing Lure

Summary

On July 23, 2024, CrowdStrike Intelligence identified the phishing domain crowdstrike-office365[.]com, which impersonates CrowdStrike and delivers malicious ZIP and RAR files containing a Microsoft Installer (MSI) loader. The loader ultimately executes Lumma Stealer packed with CypherIt.

The domain was registered on July 23, 2024, days after July 19, 2024, when an issue present in a single content update for CrowdStrike’s Falcon sensor — which impacted Windows operating systems — was identified and a fix was deployed.

The campaign is likely linked to a June 2024 Lumma Stealer distribution campaign in which a threat actor leveraged advanced social-engineering techniques, such as using spam floods and voice phishing (vishing), to deliver malicious binaries.

Details

Phishing Domain

On July 23, 2024, the domain crowdstrike-office365[.]com served a ZIP file (SHA256 hash:

50f9c384443a40d15a6e74960f1ba75dcf741eabdb5713bd2eba453a6aad81e5

) that contains the Microsoft Installer (MSI) file WidowsSystem-update.msi (SHA256 hash:

3ed535bbcd9d4980ec8bc60cd64804e9c9617b7d88723d3b05e6ad35821c3fe7

), which is a loader.

As of this writing, the domain does not appear to have a landing page and exposes an open directory containing the hosting URLs for the malicious ZIP and RAR archives (Figure 1).

Figure 1. Phishing domain content

Figure 1. Phishing domain content

MSI Loader

The MSI loader displays a decoy installation (Figure 2). Upon execution, the MSI extracts and executes a self-extracting RAR (SFX) file, plenrco.exe (SHA256 hash:

c3e50ca693f88678d1a6e05c870f605d18ad2ce5cfec6064b7b2fe81716d40b0

), with the command line plenrco.exe -pqwerty2023 -s1. This extracts another RAR SFX archive file stored in the PE overlay plenrco.exe. The RAR archive contains a Nullsoft Scriptable Install System (NSIS) installer with the filename SymposiumTaiwan.exe (SHA256 hash:

c1e27b2e7db4fba9f011317ff86b0d638fe720b945e933b286bb3cf6cdb60b6f

).

Figure 2. MSI file

Figure 2. MSI file

NSIS File

The NSIS installer SymposiumTaiwan.exe contains fragments of a legitimate AutoIt executable (SHA256 hash: 865347471135bb5459ad0e647e75a14ad91424b6f13a5c05d9ecd9183a8a1cf4) and a compiled AutoIt script (SHA256 hash: 66ad1c04ebb970f2494f2f30b45d6a83c2f3a2bb663565899f57bb5422851518).

The NSIS also contains a batch script loader named Open.cmd (SHA256 hash: 6217436a326d1abcd78a838d60ab5de1fee8a62cda9f0d49116f9c36dc29d6fa), which includes useless code to hide the actual functionality. Upon execution, the Open.cmd lists processes related to security products by invoking the Windows command tasklist. If one of the processes is detected, the malware deletes itself and terminates.

The batch script then concatenates the aforementioned fragments (previously dropped to %TMP%) to two files: Dicks.pif (an AutoIt executable) and k (a compiled AutoIt script), both of which are written to the path %TMP%\558563. Finally, the batch script runs the AutoIt executable, passing the compiled script as an argument.

CypherIt’s AutoIt Script

The decompiled AutoIt script (SHA256 hash: 2856b7d3948dfb5231056e52437257757839880732849c2e2a35de3103c64768) is a CypherIt loader that is heavily obfuscated to hinder static analysis. The loader implements string obfuscation (the Python re-implementation is included in Figure 3). The obfuscation is based on a subtraction with a seed, which is different for each string.

Figure 3. Python code to deobfuscate strings

Figure 3. Python code to deobfuscate strings

Anti-Analysis

The AutoIt loader terminates if one of the following checks is met:

  • The hostname is tzNfZtFbPfH or ELICZ; these hostnames are associated with antivirus (AV) emulators1
  • The username is test22
  • The file C:\aaa_TouchMeNot_.txt exists; this file belongs to Windows Defender sandbox
  • The antivirus processes avastui.exe or bdagent.exe are running

Next-Stage Payload

The AutoIt loader contains two shellcodes for 32-bit and 64-bit systems that implement the RC4 algorithm to decrypt the final payload, which is also hardcoded within the AutoIt loader. The AutoIt script runs one of the two shellcodes depending on the system architecture.

The final payload is RC4-encrypted — with the key 656505 — and LZNT1-compressed, which results in a Lumma Stealer sample (SHA256 hash: d669078a7cdcf71fb3f2c077d43f7f9c9fdbdb9af6f4d454d23a718c6286302a; build timestamp 2024-07-19 15:01:38 UTC). The build timestamp indicates the actor highly likely built the sample for distribution the day after the single content update for CrowdStrike’s Falcon sensor was identified and a fix was deployed.

Lumma Stealer

The final payload is a Lumma Stealer executable that contacts the command-and-control (C2) server at iiaiyitre[.]pa at the time of analysis. Additional C2 URLs, listed in Table 1, were obtained from the malware’s configuration. Lumma Stealer is a commodity information stealer that collects information from browsers, including credentials, cookies, autofill data and browser-extension data.

The same C2 domain identified in this activity was observed in a recent widespread opportunistic spam flood and voice phishing (vishing) campaign in June 2024; in that campaign, the threat actor sent numerous spam emails and conducted follow-up phone calls masquerading as a “helpdesk” operator via Microsoft Teams. Based on the shared infrastructure between the campaigns and apparent targeting of corporate networks, CrowdStrike Intelligence assesses with moderate confidence that the activity is likely attributable to the same unnamed threat actor.

Recommendations

These recommendations can be implemented to help protect against the activity described in this report.

  • Only accept updates delivered through official CrowdStrike channels and adhere to CrowdStrike support teams’ technical guidance
  • Train users to avoid executing files from untrusted sources
  • Check website certificates on the download page to ensure downloaded software originates from a legitimate source
  • Use browser settings to enable download protection that can issue warnings regarding potentially harmful websites or downloads
  • Consider blocking AutoIt executables when not required in the corporate environment; CypherIt-packed executables use AutoIt and .pif files to run payloads

Appendix

Falcon LogScale Queries

This Falcon LogScale query detects the activity described in this alert.

// Indicators related to CSA-240849 (CSA-240849) // hunting rule for indicators (CSA-240849) case { in("SHA256HashData", values=["1e06ef09d9e487fd54dbb70784898bff5c3ee25d87f468c9c5d0dfb8948fb45c", "280900902df7bb855b27614884b369e5e0da25ff22efacc59443a4f593ccd145", "3ed535bbcd9d4980ec8bc60cd64804e9c9617b7d88723d3b05e6ad35821c3fe7", "50f9c384443a40d15a6e74960f1ba75dcf741eabdb5713bd2eba453a6aad81e5", "66ad1c04ebb970f2494f2f30b45d6a83c2f3a2bb663565899f57bb5422851518", "6ec39c6eee15805ef3098af7ae172517a279b042fc6c323ebf1aef8f8f2b21be", "922b1f00115dfac831078bb5e5571640e95dbd0d6d4022186e5aa4165082c6b2", "a992cee863a4668698af92b4f9bd427d7a827996bf09824b89beff21578b49bd", "aca54f9f5398342566e02470854aff48c53659be0c0cb83d3ce1fd05430375f8", "b5c0610bc01cfc3dafc9c976cb00fe7240430f0d03ec5e112a0b3f153f93b49a", "d669078a7cdcf71fb3f2c077d43f7f9c9fdbdb9af6f4d454d23a718c6286302a", "e6b00ee585b008f110829df68c01a62d3bfac1ffe7d65298c8a4e4109b8a7319", "e9cd2429628e3955dd1f7c714fbaa3e3b85bfaac0bc31582cf9c5232cb8fc352", "bb7a19963b422ed31b0b942eeaad7388421bc270a8513337f8ec043a84a4f11c", "56f2aedb86d26da157b178203cec09faff26e659f6f2be916597c9dd4825d69f"]); in("DomainName", values=["callosallsaospz.shop", "crowdstrike-office365.com", "go.microsoft.crowdstrike-office365.com", "iiaiyitre.pa", "indexterityszcoxp.shop", "lariatedzugspd.shop", "liernessfornicsa.shop", "outpointsozp.shop", "shepherdlyopzc.shop", "unseaffarignsk.shop", "upknittsoappz.shop", "warrantelespsz.shop"]) } | table([cid, aid, #event_simpleName, ComputerName])

Indicators of Compromise (IOCs)

DescriptionDetail
Hosting URLhttps[:]//crowdstrike-office365[.]com/go[.]microsoft.crowdstrike-office365[.]com/download.html
Phishing Domaincrowdstrike-office365[.]com
Lumma Stealer SHA256 hashd669078a7cdcf71fb3f2c077d43f7f9c9fdbdb9af6f4d454d23a718c6286302a
Lumma Stealer C2 URLsiiaiyitre[.]pa indexterityszcoxp[.]shop lariatedzugspd[.]shop callosallsaospz[.]shop outpointsozp[.]shop liernessfornicsa[.]shop upknittsoappz[.]shop shepherdlyopzc[.]shop unseaffarignsk[.]shop warrantelespsz[.]shop iiaiyitre[.]pa indexterityszcoxp[.]shop lariatedzugspd[.]shop callosallsaospz[.]shop outpointsozp[.]shop liernessfornicsa[.]shop upknittsoappz[.]shop shepherdlyopzc[.]shop unseaffarignsk[.]shop warrantelespsz[.]shop
Compiled AutoIt Script containing Lumma Stealer (k)66ad1c04ebb970f2494f2f30b45d6a83c2f3a2bb663565899f57bb5422851518
NSIS installer containing AutoIt Script (SymposiumTaiwan.exe)c1e27b2e7db4fba9f011317ff86b0d638fe720b945e933b286bb3cf6cdb60b6f
Batch script loader in NSIS installer (Open.cmd)6217436a326d1abcd78a838d60ab5de1fee8a62cda9f0d49116f9c36dc29d6fa
Self-extracting archive containing AutoIt Script (plenrco.exe)c3e50ca693f88678d1a6e05c870f605d18ad2ce5cfec6064b7b2fe81716d40b0
MSI files containing self-extracting archive (UpdateMsWindows.msi, msoffice365update.msi, Microsoft365updater.msi, office365crowndStrike.msi, WidowsSystem-update.msi)1e06ef09d9e487fd54dbb70784898bff5c3ee25d87f468c9c5d0dfb8948fb45c e9cd2429628e3955dd1f7c714fbaa3e3b85bfaac0bc31582cf9c5232cb8fc352 bb7a19963b422ed31b0b942eeaad7388421bc270a8513337f8ec043a84a4f11c aca54f9f5398342566e02470854aff48c53659be0c0cb83d3ce1fd05430375f8 3ed535bbcd9d4980ec8bc60cd64804e9c9617b7d88723d3b05e6ad35821c3fe7
RAR and ZIP files containing MSI files (UpdateMSwindows.rar, UpdateMSwindows.rar, msoffice365update.rar, msoffice365update.zip, office365crowndStrike.rar, office365crowndStrike.zip, WidowsSystem-update.zip)6ec39c6eee15805ef3098af7ae172517a279b042fc6c323ebf1aef8f8f2b21be 922b1f00115dfac831078bb5e5571640e95dbd0d6d4022186e5aa4165082c6b2 56f2aedb86d26da157b178203cec09faff26e659f6f2be916597c9dd4825d69f e6b00ee585b008f110829df68c01a62d3bfac1ffe7d65298c8a4e4109b8a7319 b5c0610bc01cfc3dafc9c976cb00fe7240430f0d03ec5e112a0b3f153f93b49a 280900902df7bb855b27614884b369e5e0da25ff22efacc59443a4f593ccd145 a992cee863a4668698af92b4f9bd427d7a827996bf09824b89beff21578b49bd  

Table 1. Indicators of compromise

MITRE ATT&CK

This table details the MITRE ATT&CK® tactics and techniques described in this report.

TacticTechniqueObservable
Initial AccessT1566 – PhishingThe malicious MSI is distributed via a phishing domain
ExecutionT1059.003 – Command and Scripting Interpreter: Windows Command ShellThe NSIS installer contains a batch script that deletes the malware if security products are detected
T1204 – User ExecutionThe user is prompted to install the malicious executable, which masquerades as an MSI file
Defense EvasionT1027.002 – Obfuscated Files or Information: Software PackingLumma Stealer is packed using CipherIT
ExfiltrationT1041 – Exfiltration Over C2 ChannelLumma Stealer sends all exfiltrated data to its C2 server

Table 2. MITRE ATT&CK mapping

https[:]//www[.]usenix[.]org/system/files/conference/woot16/woot16-paper-blackthorne_update[.]pdf

Don’t Stop Here

More To Explore

favicon__1_ removebg-png

BE THE FIRST TO KNOW

Stay informed with the latest insights in our Infostealers weekly report.

Receive immediate notification if your email is involved in an infostealer infection.

No Spam, We Promise

favicon__1_ removebg-png

BE THE FIRST TO KNOW

Stay informed with the latest insights in our Infostealers weekly report.

Receive immediate notification if your email is involved in an infostealer infection.

No Spam, We Promise