General

  • Target

    8eabdfcfadad8ac12185a77ac647813b28be7d9d64939f70bd13a2e6b5e1f3fc

  • Size

    559KB

  • Sample

    241005-av8nkszalb

  • MD5

    3b6f6272a9eafeaad3063b47c41a0bcf

  • SHA1

    5e52d54ae4ecf8e8f0e6b170643748a00679fd11

  • SHA256

    8eabdfcfadad8ac12185a77ac647813b28be7d9d64939f70bd13a2e6b5e1f3fc

  • SHA512

    6425d9d03461a14c1172cfe867827e7f3adb538bf457c81b3f6ef6cb830ddca763a732f6da9838313d09137dd3e7215e922d32b4ee4985b1d1c474aa6a6ad5c5

  • SSDEEP

    12288:pSt9OYi8xZZNVTPngVaUOETglv/q7iUr4V55yFw90fevzw27+PHEO:puTZPtqdTgJi+O4uMR7wHt

Malware Config

Extracted

Family

vidar

C2

http://proxy.johnmccrea.com/

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

lumma

Extracted

Family

lumma

C2

https://spirittunek.store/api

https://mobbipenju.store/api

https://eaglepawnoy.store/api

https://dissapoiznw.store/api

https://bathdoomgaz.store/api

https://studennotediw.store/api

Targets

    • Target

      8eabdfcfadad8ac12185a77ac647813b28be7d9d64939f70bd13a2e6b5e1f3fc

    • Size

      559KB

    • MD5

      3b6f6272a9eafeaad3063b47c41a0bcf

    • SHA1

      5e52d54ae4ecf8e8f0e6b170643748a00679fd11

    • SHA256

      8eabdfcfadad8ac12185a77ac647813b28be7d9d64939f70bd13a2e6b5e1f3fc

    • SHA512

      6425d9d03461a14c1172cfe867827e7f3adb538bf457c81b3f6ef6cb830ddca763a732f6da9838313d09137dd3e7215e922d32b4ee4985b1d1c474aa6a6ad5c5

    • SSDEEP

      12288:pSt9OYi8xZZNVTPngVaUOETglv/q7iUr4V55yFw90fevzw27+PHEO:puTZPtqdTgJi+O4uMR7wHt

    • Detect Vidar Stealer

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks