General

  • Target

    xfer records serum keygen torrent.7z

  • Size

    18.4MB

  • Sample

    241006-tlqwysxbnc

  • MD5

    8d615841cac41768b6ef948e01802715

  • SHA1

    09780bbe2ac2cc69fc7ac212565509e19a1e83fd

  • SHA256

    8cba6793d5f75fb8ef1cd0e13713a70752a62f65437545c2aef7302fba033167

  • SHA512

    dccbfeca11328b21c6ae431a2e3aa6b09a0032108dbb0772cd2ca731d87fb99a1bf56aedb9ae2792e4c12500bb19db0721fce581e392ba3c7869fd526b5932cd

  • SSDEEP

    393216:bt1PLlyByR2b/1W7Kokdpb5tEkdfTr+ig2FcDdLVmqIbBW1vMHld:J9LlF2b9CKppFtxlTaigcYdLVmvbBW1Y

Malware Config

Extracted

Family

lumma

C2

https://trustterwowqm.shop/api

Extracted

Family

vidar

C2

http://proxy.johnmccrea.com/

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

stealc

Botnet

default5_doz

C2

http://62.204.41.159

Attributes
  • url_path

    /edd20096ecef326d.php

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://my.cloudme.com/v1/ws2/:gofilenew/:mpresents/mpresents.txt

Targets

    • Target

      xfer records serum keygen torrent.exe

    • Size

      789.6MB

    • MD5

      c34b5e3e41da18832f20396ce3f0830f

    • SHA1

      ff9ddeee78b111a35e064ccd59e91881c61dd948

    • SHA256

      a0e6d0eb6d9a7c3e70e4908be70d3a1439421692d033e2a07a36284fb08c2910

    • SHA512

      5e57e493e9bff3efa992e9ed6e4fb25d717b57208ca73dcb57d87b421b0afe27d387dfea444f7f1222063e0fa05b6631cc0a7c9ba83e88d0d98130e433ccc0c6

    • SSDEEP

      393216:SjSaYG7C1vebP6ORz930cDuiG2atWnVdYqf0euoAXwc:SuNGG1OP6ORZEciaa4XYqnNvc

    • Detect Vidar Stealer

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Modifies firewall policy service

    • Stealc

      Stealc is an infostealer written in C++.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks