General

  • Target

    1586d3a569933b2bbf65c97b9e104d43956eb4e057edc018c329d5a9a5800318.exe

  • Size

    580KB

  • Sample

    241008-bjcx7svglh

  • MD5

    c84cf68fa56d169c1156c124cbd9dfbc

  • SHA1

    5929ac3bc9d010755efc6b353268310c1624dace

  • SHA256

    1586d3a569933b2bbf65c97b9e104d43956eb4e057edc018c329d5a9a5800318

  • SHA512

    c724bea52356148f29c106e1ef122d25533ab6e2518c29b1e5a3c73ff48e094d60d7552019054d8ce845d038aab95d4cc30362bc876fde447341c596ab161172

  • SSDEEP

    12288:jK7qQnYbvtP2qLaeHip/DYXaRsAbpZLRL7ZW/prKa:jKtnYjXRHipMavtZLlY/Fr

Malware Config

Extracted

Family

vidar

C2

http://lade.petperfectcare.com:80

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

lumma

Targets

    • Target

      1586d3a569933b2bbf65c97b9e104d43956eb4e057edc018c329d5a9a5800318.exe

    • Size

      580KB

    • MD5

      c84cf68fa56d169c1156c124cbd9dfbc

    • SHA1

      5929ac3bc9d010755efc6b353268310c1624dace

    • SHA256

      1586d3a569933b2bbf65c97b9e104d43956eb4e057edc018c329d5a9a5800318

    • SHA512

      c724bea52356148f29c106e1ef122d25533ab6e2518c29b1e5a3c73ff48e094d60d7552019054d8ce845d038aab95d4cc30362bc876fde447341c596ab161172

    • SSDEEP

      12288:jK7qQnYbvtP2qLaeHip/DYXaRsAbpZLRL7ZW/prKa:jKtnYjXRHipMavtZLlY/Fr

    • Detect Vidar Stealer

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks