General

  • Target

    file.exe

  • Size

    571KB

  • Sample

    241007-srwtqatcma

  • MD5

    15e2906c90f3dd563b982ada3382eb2c

  • SHA1

    cb7e89b6bd626a755d8b40f174eed497f1c629dd

  • SHA256

    2bda40435881101ace72e48ffcc04afa3e5ca6e9e6caf79b0a5a132840152ada

  • SHA512

    330334c197424cb2c929e303f90eb5a0360487bd8a2d80e417b2c81556d2c30ba04e9f8d51b8d306a3099daf85664a6bf78063b9f746fac537efc29889fe4fcd

  • SSDEEP

    12288:HLg1ZnYljs/d5p6YC6Y0e/0avgePlMas+KoI04Mc3+SD4S:HwnYI5EFwaIulMas+Lq3+Ss

Malware Config

Extracted

Family

vidar

C2

http://lade.petperfectcare.com:80

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

lumma

Targets

    • Target

      file.exe

    • Size

      571KB

    • MD5

      15e2906c90f3dd563b982ada3382eb2c

    • SHA1

      cb7e89b6bd626a755d8b40f174eed497f1c629dd

    • SHA256

      2bda40435881101ace72e48ffcc04afa3e5ca6e9e6caf79b0a5a132840152ada

    • SHA512

      330334c197424cb2c929e303f90eb5a0360487bd8a2d80e417b2c81556d2c30ba04e9f8d51b8d306a3099daf85664a6bf78063b9f746fac537efc29889fe4fcd

    • SSDEEP

      12288:HLg1ZnYljs/d5p6YC6Y0e/0avgePlMas+KoI04Mc3+SD4S:HwnYI5EFwaIulMas+Lq3+Ss

    • Detect Vidar Stealer

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks