General

  • Target

    suhaag 1994 full movie mp4 download.7z

  • Size

    18.4MB

  • Sample

    240921-z6hzqsvbnk

  • MD5

    fb4f96ef7559c658ffa5112322756647

  • SHA1

    ca1210b07646e4fe1c3f8ee7b58d06e2f28d9b21

  • SHA256

    4063a99a496a001e7fe8b613e00641f4978dcd7b7cc5d5fc5436367f2ebcd12c

  • SHA512

    a2783f5a23dabf9ec1b3a13e785f356e34aa38b018653abfa09286b45c04fe274ec81a7977921b9901c62c526cd67faefd53a6af98b691c5365b9117c67a0aca

  • SSDEEP

    393216:TWpec0xr42ITf6zwzniOcaDchnQu1nhlYMk2vTpTMe0kYRWKMH6P7y:CpecKr4VC0niOcaD5u6uTpTDrYUjc7y

Malware Config

Extracted

Family

vidar

Version

11

Botnet

3a15237aa92dcd8ccca447211fb5fc2a

C2

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

lumma

C2

https://appleboltelwk.shop/api

Targets

    • Target

      suhaag 1994 full movie mp4 download.exe

    • Size

      890.4MB

    • MD5

      cfaefdb151a490dc8047af6843b53b7b

    • SHA1

      e07aebd16c38cfcb560ddcd075a2c89aa28ae18c

    • SHA256

      f7089901034876bd1e7bb7c9bd510a5e829897237b619f08eec99f6685fc9aa8

    • SHA512

      ae72fa594c780056e0da0919d36b2790280eb91939ef74af098642918386eac9f8e9addf0d6bcd272c79996c30871b34696bdd97dd297740d892f3f4ae3c4f63

    • SSDEEP

      393216:m+3MOe3n7mOxAUUNGD/FZkfijYUy4FtPIapG0VvXHFjHmTYAAzX:i7iI/Ufi3ybuG0RXFjHmvAzX

    • Detect Vidar Stealer

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks