General

  • Target

    7f3c2473d1e6.exe

  • Size

    571KB

  • Sample

    241007-t3lzbszfmm

  • MD5

    b84100c670bb19e92bfb62423048aa43

  • SHA1

    592f3aef7ad93db6527d8e9d06b2ebbae1a51a79

  • SHA256

    7823532217e8b06b102734023019188833b3e0ae711c3dc6f9cb437d8c48d14b

  • SHA512

    25610d8053a29ef458a690e1435008cbdfd990e2548dbad0db929e539a594c61c144f0025f4b74788324d507af37c66dde302ba513f5279d4f2b37ec5ab8a953

  • SSDEEP

    12288:HcEcpXoWDMr3QZJG6/vrB7JOpf/4Xx8Yl6E0nfhLZ4S:HOXo5Q/vXipYXx3l65ntK

Malware Config

Extracted

Family

vidar

C2

http://lade.petperfectcare.com:80

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

lumma

Targets

    • Target

      7f3c2473d1e6.exe

    • Size

      571KB

    • MD5

      b84100c670bb19e92bfb62423048aa43

    • SHA1

      592f3aef7ad93db6527d8e9d06b2ebbae1a51a79

    • SHA256

      7823532217e8b06b102734023019188833b3e0ae711c3dc6f9cb437d8c48d14b

    • SHA512

      25610d8053a29ef458a690e1435008cbdfd990e2548dbad0db929e539a594c61c144f0025f4b74788324d507af37c66dde302ba513f5279d4f2b37ec5ab8a953

    • SSDEEP

      12288:HcEcpXoWDMr3QZJG6/vrB7JOpf/4Xx8Yl6E0nfhLZ4S:HOXo5Q/vXipYXx3l65ntK

    • Detect Vidar Stealer

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks