General

  • Target

    5f7bdc962aa76f272673ffb86ae8d634.bin

  • Size

    282KB

  • Sample

    240907-bqa27axemk

  • MD5

    14f41d7ca8fec2d9758e204483ac46d9

  • SHA1

    1fc89d5b40deb8a483e7044298e180a8f300652d

  • SHA256

    5aea71f015eb65326576743db122e154df44e0abfb5c389f0478ef443058491b

  • SHA512

    64c00ba527f3d7bf6cc7db005460381a911b5424e4617ce79102e4030bcec613edfa148edf03db2768841ff4e98397e9fecefa3fb2163d19a144de55ed1f377f

  • SSDEEP

    6144:PrAEuY7QrOvwJLlxTYcDVAl3H9sOU3O+B77ISywdm+Vi:PrRV+OvwZ/TQl6OUZ7ISyd+Vi

Malware Config

Extracted

Family

vidar

C2

http://147.45.68.138:80

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

https://t.me/fneogr

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Extracted

Family

lumma

C2

https://stagedchheiqwo.shop/api

Targets

    • Target

      9482245f504dc281027c12eed58c987147b2d982c3669e1c7dca3bc0911e7b97.exe

    • Size

      294KB

    • MD5

      5f7bdc962aa76f272673ffb86ae8d634

    • SHA1

      0d78738b625c66f105c24484920a78ac02bd1533

    • SHA256

      9482245f504dc281027c12eed58c987147b2d982c3669e1c7dca3bc0911e7b97

    • SHA512

      62b6be5a24108c685a0824399dc78b33b5b52149d0e1b7792ac90a30d6fbd7bb2b0650563861e493c79f2313c33a2112f0bd9366e0947d24bee9b1206b4c0141

    • SSDEEP

      6144:/IQ+sJCd1Tq+7ZMTEfLNGfG/7xcs8UyfYD+QKJ7JwGA358n47bDlcwIMHEO:wQ3yBqTEfxG4p8Uyu+97JwGGinaDBEO

    • Detect Vidar Stealer

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks