General

  • Target

    59776469143431b5ddf203e169ed86915ff04fff5ff8e7231a53472c043eabf4.exe

  • Size

    413KB

  • Sample

    241004-bv9rba1ckg

  • MD5

    7b5e8e3db2ce9c97f6a8214a4ccd3872

  • SHA1

    e26cc5d9f9489593ae727a3358602d7b963f7f59

  • SHA256

    59776469143431b5ddf203e169ed86915ff04fff5ff8e7231a53472c043eabf4

  • SHA512

    2b4793d855a298b7ca36c7a9d8e5602634ddfc7c675f9bc1462a1c69d1fbd7f269354b73c361f5906da86b577f8c10589cda64acdd1fc1eae624e2ed24da5f98

  • SSDEEP

    6144:RM61zc6W8/LuuBdM5+52YL3TIOwOh9Zc+5FiMwKDD19YPeOVzUZXVe1TnRwhj3AK:RTHW8TuurM5gL8avk253dbe1TnSq+5EO

Malware Config

Extracted

Family

vidar

Version

11

Botnet

bb7310eab4245006f125c442da2d1e50

C2

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

lumma

Extracted

Family

lumma

C2

https://beearvagueo.site/api

Targets

    • Target

      59776469143431b5ddf203e169ed86915ff04fff5ff8e7231a53472c043eabf4.exe

    • Size

      413KB

    • MD5

      7b5e8e3db2ce9c97f6a8214a4ccd3872

    • SHA1

      e26cc5d9f9489593ae727a3358602d7b963f7f59

    • SHA256

      59776469143431b5ddf203e169ed86915ff04fff5ff8e7231a53472c043eabf4

    • SHA512

      2b4793d855a298b7ca36c7a9d8e5602634ddfc7c675f9bc1462a1c69d1fbd7f269354b73c361f5906da86b577f8c10589cda64acdd1fc1eae624e2ed24da5f98

    • SSDEEP

      6144:RM61zc6W8/LuuBdM5+52YL3TIOwOh9Zc+5FiMwKDD19YPeOVzUZXVe1TnRwhj3AK:RTHW8TuurM5gL8avk253dbe1TnSq+5EO

    • Detect Vidar Stealer

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks