General

  • Target

    a72af6c3293eb3061bba1e48ba6147de.exe

  • Size

    571KB

  • Sample

    241008-a3hr5azfrp

  • MD5

    a72af6c3293eb3061bba1e48ba6147de

  • SHA1

    316276ac440f65361db52e49a7fc4d2a9be1f457

  • SHA256

    7dc3d6e633cbabe95c39fa36f94ab6657e3c04dab7a9a6c1f79c9e2424378e00

  • SHA512

    3bea2955df160fc3ce1ad61c0cf1a6946bf4d12147596e63ff3eb359db9af4f32ea8e0595c65bec0d5651f76a029a9afac621fab08e5e21c7b1f8794740617ca

  • SSDEEP

    12288:eMs0xfgBSzc9gm8naRK1RDr/EbeWsFU37LpZdE3f8Hcz74S:eWfgv8naRK1Ncbe5S/jsf8SU

Malware Config

Extracted

Family

vidar

Botnet

4a5bc8b73e12425adc3c399da8136891

C2

https://t.me/maslengdsa

https://steamcommunity.com/profiles/76561199786602107

https://t.me/lpnjoke

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

lumma

Targets

    • Target

      a72af6c3293eb3061bba1e48ba6147de.exe

    • Size

      571KB

    • MD5

      a72af6c3293eb3061bba1e48ba6147de

    • SHA1

      316276ac440f65361db52e49a7fc4d2a9be1f457

    • SHA256

      7dc3d6e633cbabe95c39fa36f94ab6657e3c04dab7a9a6c1f79c9e2424378e00

    • SHA512

      3bea2955df160fc3ce1ad61c0cf1a6946bf4d12147596e63ff3eb359db9af4f32ea8e0595c65bec0d5651f76a029a9afac621fab08e5e21c7b1f8794740617ca

    • SSDEEP

      12288:eMs0xfgBSzc9gm8naRK1RDr/EbeWsFU37LpZdE3f8Hcz74S:eWfgv8naRK1Ncbe5S/jsf8SU

    • Detect Vidar Stealer

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks