General

  • Target

    22148fb016ed09214857719fc3e14aac6656add8adb1454089de46f77b716105

  • Size

    551KB

  • Sample

    241005-a9zn8awclp

  • MD5

    9b0c211b7ffbdb9b163211ee495e87fb

  • SHA1

    00c6527ddde460472525f64e02d66121c5a50fec

  • SHA256

    22148fb016ed09214857719fc3e14aac6656add8adb1454089de46f77b716105

  • SHA512

    21c4ba20f82fb00dc86415cf78e0c8538fcb968c46a63940c617f1d4dcb55538821ab4f1955ec9cfc3538c1bf08766c554eb1d3a286450ec25b36ec3d13e6fc0

  • SSDEEP

    12288:uDnrXQcjZvajIgnk1QUM8F6qBaFdakuj8mgPGdQsP:uDLdZNVMO6qpImgPGn

Malware Config

Extracted

Family

vidar

C2

http://proxy.johnmccrea.com/

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

lumma

Extracted

Family

lumma

C2

https://spirittunek.store/api

https://mobbipenju.store/api

https://eaglepawnoy.store/api

https://dissapoiznw.store/api

https://studennotediw.store/api

https://bathdoomgaz.store/api

Targets

    • Target

      22148fb016ed09214857719fc3e14aac6656add8adb1454089de46f77b716105

    • Size

      551KB

    • MD5

      9b0c211b7ffbdb9b163211ee495e87fb

    • SHA1

      00c6527ddde460472525f64e02d66121c5a50fec

    • SHA256

      22148fb016ed09214857719fc3e14aac6656add8adb1454089de46f77b716105

    • SHA512

      21c4ba20f82fb00dc86415cf78e0c8538fcb968c46a63940c617f1d4dcb55538821ab4f1955ec9cfc3538c1bf08766c554eb1d3a286450ec25b36ec3d13e6fc0

    • SSDEEP

      12288:uDnrXQcjZvajIgnk1QUM8F6qBaFdakuj8mgPGdQsP:uDLdZNVMO6qpImgPGn

    • Detect Vidar Stealer

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks