General

  • Target

    4b405c22574517f903942744984e85e0240fe1b020e30ab94b3d3225ac7f5a58

  • Size

    6.0MB

  • Sample

    240801-2jnmtazdjj

  • MD5

    2768d35cf6fa54b1db18e61842e61daf

  • SHA1

    940b98dcd682a0d087901c122a2860bc67f39fa4

  • SHA256

    4b405c22574517f903942744984e85e0240fe1b020e30ab94b3d3225ac7f5a58

  • SHA512

    3b231d8e01f42863dfe10e7190c7751fd7d548aef3b4d2c80a4819fff71e2cd46fd083aae7bb24f15ebf102d88d17f9d91d57112704bb7f3fca89af3d97ef0b7

  • SSDEEP

    98304:P3Fr4mzBPN//iM5KxPGEw3Np8c6C/h6qwolphehY:P3Fr4MBPN//iM5EPGEalzeh

Malware Config

Extracted

Family

vidar

C2

https://steamcommunity.com/profiles/76561199747278259

https://t.me/armad2a

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 YaBrowser/24.6.0.1 Safari/537.36

Extracted

Family

lumma

C2

https://tenntysjuxmz.shop/api

Targets

    • Target

      4b405c22574517f903942744984e85e0240fe1b020e30ab94b3d3225ac7f5a58

    • Size

      6.0MB

    • MD5

      2768d35cf6fa54b1db18e61842e61daf

    • SHA1

      940b98dcd682a0d087901c122a2860bc67f39fa4

    • SHA256

      4b405c22574517f903942744984e85e0240fe1b020e30ab94b3d3225ac7f5a58

    • SHA512

      3b231d8e01f42863dfe10e7190c7751fd7d548aef3b4d2c80a4819fff71e2cd46fd083aae7bb24f15ebf102d88d17f9d91d57112704bb7f3fca89af3d97ef0b7

    • SSDEEP

      98304:P3Fr4mzBPN//iM5KxPGEw3Np8c6C/h6qwolphehY:P3Fr4MBPN//iM5EPGEalzeh

    • Detect Vidar Stealer

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks