General

  • Target

    2bdab82a67299ff24cca7e0884c17fab80f45b364ba718142c80bdfbd573b581.exe

  • Size

    5.4MB

  • Sample

    240929-llql7a1fkc

  • MD5

    8d556f35d2768d27b334d0e76d4d3295

  • SHA1

    33f2fbfe5c2b3d3d470bbf28c20e15283e20717c

  • SHA256

    2bdab82a67299ff24cca7e0884c17fab80f45b364ba718142c80bdfbd573b581

  • SHA512

    eadec8014bc15d1f72c44e5a45a2546a450d3c529aecc21d850ea50ebda1b5d47d569b4c6aef4215c402db87efbac7550736d28bc101d920f900ea80f83bc4ea

  • SSDEEP

    98304:Eg2nmyTusqokbqW3alL1eMT8dq+5L34fs6DvS/GhE5ZyxDmwXQsZRqKoGgLNxeId:bryTusqok2kgeMIY+5L34f2MCkmwXdRk

Malware Config

Extracted

Family

vidar

Version

11

Botnet

ffa0fc7713f6625bf874f947bcf3df53

C2

https://t.me/jamsemlg

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

lumma

C2

https://reinforcenh.shop/api

https://stogeneratmns.shop/api

https://fragnantbui.shop/api

https://drawzhotdog.shop/api

https://vozmeatillu.shop/api

https://offensivedzvju.shop/api

https://ghostreedmnu.shop/api

https://gutterydhowi.shop/api

Extracted

Family

vidar

Version

11

Botnet

c8450254a9a0920212cb81ae7f386da3

C2

https://t.me/jamsemlg

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Targets

    • Target

      2bdab82a67299ff24cca7e0884c17fab80f45b364ba718142c80bdfbd573b581.exe

    • Size

      5.4MB

    • MD5

      8d556f35d2768d27b334d0e76d4d3295

    • SHA1

      33f2fbfe5c2b3d3d470bbf28c20e15283e20717c

    • SHA256

      2bdab82a67299ff24cca7e0884c17fab80f45b364ba718142c80bdfbd573b581

    • SHA512

      eadec8014bc15d1f72c44e5a45a2546a450d3c529aecc21d850ea50ebda1b5d47d569b4c6aef4215c402db87efbac7550736d28bc101d920f900ea80f83bc4ea

    • SSDEEP

      98304:Eg2nmyTusqokbqW3alL1eMT8dq+5L34fs6DvS/GhE5ZyxDmwXQsZRqKoGgLNxeId:bryTusqok2kgeMIY+5L34f2MCkmwXdRk

    • Detect Vidar Stealer

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks