Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family LummaStealer
Trojan:Win32/LummaStealer.MBX!MTB is a highly dangerous information stealer that targets Windows 32-bit systems. This threat leverages sophisticated techniques, including machine learning behavioral analysis and specific PE file string patterns, to evade detection and exfiltrate sensitive user data such as credentials, cryptocurrency wallets, and browser information.
Relevant strings associated with this threat: - aeblfdkhhhdcdjpifhhbdiojplfjncoa (PEHSTR_EXT)
rule Trojan_Win32_LummaStealer_MBX_2147939971_0
{
meta:
author = "threatcheck.sh"
detection_name = "Trojan:Win32/LummaStealer.MBX!MTB"
threat_id = "2147939971"
type = "Trojan"
platform = "Win32: Windows 32-bit platform"
family = "LummaStealer"
severity = "Critical"
info = "MTB: Microsoft Threat Behavior"
signature_type = "SIGNATURE_TYPE_PEHSTR_EXT"
threshold = "3"
strings_accuracy = "High"
strings:
$x_1_1 = "ejbalbakoplchlghecdalmeeeajnimhm" ascii //weight: 1
$x_1_2 = "aeblfdkhhhdcdjpifhhbdiojplfjncoa" ascii //weight: 1
$x_1_3 = "jnlgamecbpmbajjfhmmmlhejkemejdma" ascii //weight: 1
$x_1_4 = "dlcobpjiigpikoobohmabehhmhfoodbb" ascii //weight: 1
$x_1_5 = "jgaaimajipbpdogpdglhaphldakikgef" ascii //weight: 1
condition:
(filesize < 20MB) and
(3 of ($x*))
}f4f845b335a140429ca1c15acba7894bd03e385602ae6e42e32fcdbbe95015daea2ba0a6685c82ac9a13a8f3235dc8fbd81d93927bd16e80581b47fbf42e68de22016ba9c825af6f0526579afcdd2a2c84780ffa4a73458ef87e4ae80c894470f0f0df2bd791b9dd2338ed0cc7e705f09c370df96623a85908c08a92214148207215119a433c4a6278299112067e8ff369bf6464af7824324fc6e147898c31cbImmediately isolate the infected system to prevent further compromise and data exfiltration. Perform a full system scan with updated antivirus/EDR software and remove all identified threats. Due to the nature of an information stealer, all credentials (passwords, API keys, session tokens) used on the compromised system must be reset, and affected accounts should be closely monitored for suspicious activity. A full system reimage is highly recommended for critical systems to ensure complete eradication.