General

  • Target

    454cc1022d742608516bc98da91be893556f594efcf036b837b4e214b40fdbc2

  • Size

    571KB

  • Sample

    241008-kr464asaqd

  • MD5

    ce42368b4e2e6ac175dcf2f8e2a9729c

  • SHA1

    95cf67c3b6e2e261f0b86a69cbfeb05c30307381

  • SHA256

    454cc1022d742608516bc98da91be893556f594efcf036b837b4e214b40fdbc2

  • SHA512

    3244fab9ce4307f9f5baede97f697fafb434d64ae7eec096dd9a686caf9fe7d7023df3965cb661a0673c1d61d6e3b7553834f094aa6bb28b7342fb3e81218a89

  • SSDEEP

    12288:ygoEhvQ9zcMW21fTEjv75YGFDErZq0q5ORS4S:y+vQjIjz5hWS5S

Malware Config

Extracted

Family

vidar

Botnet

4a5bc8b73e12425adc3c399da8136891

C2

https://t.me/maslengdsa

https://steamcommunity.com/profiles/76561199786602107

https://t.me/lpnjoke

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

lumma

Targets

    • Target

      454cc1022d742608516bc98da91be893556f594efcf036b837b4e214b40fdbc2

    • Size

      571KB

    • MD5

      ce42368b4e2e6ac175dcf2f8e2a9729c

    • SHA1

      95cf67c3b6e2e261f0b86a69cbfeb05c30307381

    • SHA256

      454cc1022d742608516bc98da91be893556f594efcf036b837b4e214b40fdbc2

    • SHA512

      3244fab9ce4307f9f5baede97f697fafb434d64ae7eec096dd9a686caf9fe7d7023df3965cb661a0673c1d61d6e3b7553834f094aa6bb28b7342fb3e81218a89

    • SSDEEP

      12288:ygoEhvQ9zcMW21fTEjv75YGFDErZq0q5ORS4S:y+vQjIjz5hWS5S

    • Detect Vidar Stealer

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks