General

  • Target

    c1a96310dd45b906c51fd21fd604550225e1eec1941245850b24773e22768ad7_dump.exe

  • Size

    182KB

  • Sample

    240802-3qmjrszdmc

  • MD5

    0512f22ab35b0f96b0c4aa586c319190

  • SHA1

    723eca61d51d41d0dfce9f21949c7886f289d75f

  • SHA256

    c6c2bcb1f03e9af5e03fc2152420f451c28afcc1ba505c4f7c941360449c003d

  • SHA512

    a851d823a5521f98baa4e32ea7b6482bc687754dcc224b466b449cbbbda5b957edcfadc1e53dd65f9008add008a7866ad3def9676b20067800754674e3d8ede8

  • SSDEEP

    3072:Jiyi/SfJhUwLibCxNKBC6y8WyQQF1h7NOwUPfbldFw0t+Z0vhAVfEgr2Csy5kilr:0bShBLWANKrBWyt3ZOwUPfbldFw0t+Zx

Malware Config

Extracted

Family

vidar

C2

https://steamcommunity.com/profiles/76561199747278259

https://t.me/armad2a

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 YaBrowser/24.6.0.1 Safari/537.36

Extracted

Family

lumma

C2

https://chequedxmznp.shop/api

https://shelterryujxo.shop/api

https://illnesmunxkza.shop/api

https://triallyforwhgh.shop/api

https://shootydowtqosm.shop/api

https://faceddullinhs.shop/api

https://egorepetiiiosn.shop/api

https://ammycanedpors.shop/api

Extracted

Family

lumma

C2

https://tenntysjuxmz.shop/api

Targets

    • Target

      c1a96310dd45b906c51fd21fd604550225e1eec1941245850b24773e22768ad7_dump.exe

    • Size

      182KB

    • MD5

      0512f22ab35b0f96b0c4aa586c319190

    • SHA1

      723eca61d51d41d0dfce9f21949c7886f289d75f

    • SHA256

      c6c2bcb1f03e9af5e03fc2152420f451c28afcc1ba505c4f7c941360449c003d

    • SHA512

      a851d823a5521f98baa4e32ea7b6482bc687754dcc224b466b449cbbbda5b957edcfadc1e53dd65f9008add008a7866ad3def9676b20067800754674e3d8ede8

    • SSDEEP

      3072:Jiyi/SfJhUwLibCxNKBC6y8WyQQF1h7NOwUPfbldFw0t+Z0vhAVfEgr2Csy5kilr:0bShBLWANKrBWyt3ZOwUPfbldFw0t+Zx

    • Detect Vidar Stealer

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks