General

  • Target

    06390aa03e80bca99d43d83e1420b1695ca772c05ddb2eb211333fd70d540bc6

  • Size

    580KB

  • Sample

    241007-3x5nxssgpf

  • MD5

    a1304c7b58399a5f85511fcdb3f89149

  • SHA1

    6a1ddd9e6f7c4977bc0bb850f6b83d7a8582f75e

  • SHA256

    06390aa03e80bca99d43d83e1420b1695ca772c05ddb2eb211333fd70d540bc6

  • SHA512

    fb91e2202c85bb8e8bff4aef5ddcaaf0b45128b2efe681b34a5cdb9340bc409b94eff622ba312c58ca5aa49b74005d5ec8f1abbe3da6c9c1f7046c3fa148ef42

  • SSDEEP

    12288:sKHCYvQ2v97bj+p24pAlrERc1LQ+anta77gbUrKA:sKZvQaW24pKh0ntVb65

Malware Config

Extracted

Family

vidar

C2

http://lade.petperfectcare.com:80

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

lumma

Targets

    • Target

      06390aa03e80bca99d43d83e1420b1695ca772c05ddb2eb211333fd70d540bc6

    • Size

      580KB

    • MD5

      a1304c7b58399a5f85511fcdb3f89149

    • SHA1

      6a1ddd9e6f7c4977bc0bb850f6b83d7a8582f75e

    • SHA256

      06390aa03e80bca99d43d83e1420b1695ca772c05ddb2eb211333fd70d540bc6

    • SHA512

      fb91e2202c85bb8e8bff4aef5ddcaaf0b45128b2efe681b34a5cdb9340bc409b94eff622ba312c58ca5aa49b74005d5ec8f1abbe3da6c9c1f7046c3fa148ef42

    • SSDEEP

      12288:sKHCYvQ2v97bj+p24pAlrERc1LQ+anta77gbUrKA:sKZvQaW24pKh0ntVb65

    • Detect Vidar Stealer

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks