General

  • Target

    file.exe

  • Size

    559KB

  • Sample

    241003-qf3rsayanq

  • MD5

    c9784db0c88a05a8aae9ddb7289b51db

  • SHA1

    7ce51feb0e818f5acb6ba4f1deb9f4fef04d7cd6

  • SHA256

    fa8e8dfb272f18daaece8b6ac3f9d6b16f9484764aff1005c9096909d75f760d

  • SHA512

    5dcbe1ea972859d9be452355774aef12c99a65824e7ffc47f6229ee0ca8d460b0d6ef2c9209dd03eb92fc48ab89d4a96bb2fc0c5518111e55361b1ddad70b095

  • SSDEEP

    12288:W/VmqBOr6mq0eOValpFrLeIOu2qSturmTdFtiDPF:0nHYKr5iIOu2qcOmTnti7F

Malware Config

Extracted

Family

vidar

Version

11

Botnet

433cd71b7a2bdd3668a493b00ee95630

C2

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

lumma

Extracted

Family

lumma

C2

https://advocachark.store/api

Targets

    • Target

      file.exe

    • Size

      559KB

    • MD5

      c9784db0c88a05a8aae9ddb7289b51db

    • SHA1

      7ce51feb0e818f5acb6ba4f1deb9f4fef04d7cd6

    • SHA256

      fa8e8dfb272f18daaece8b6ac3f9d6b16f9484764aff1005c9096909d75f760d

    • SHA512

      5dcbe1ea972859d9be452355774aef12c99a65824e7ffc47f6229ee0ca8d460b0d6ef2c9209dd03eb92fc48ab89d4a96bb2fc0c5518111e55361b1ddad70b095

    • SSDEEP

      12288:W/VmqBOr6mq0eOValpFrLeIOu2qSturmTdFtiDPF:0nHYKr5iIOu2qcOmTnti7F

    • Detect Vidar Stealer

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks