General

  • Target

    428443b4eec33a6f84f7f0968f4d2f67cdf0fb4981fd520edc6759620cff20de

  • Size

    571KB

  • Sample

    241008-lnsvbszcjm

  • MD5

    5954cc052f68abcdc9f2310ee5317b76

  • SHA1

    7d99ef2c31fd1577fad8306d0f895bbdc78a2493

  • SHA256

    428443b4eec33a6f84f7f0968f4d2f67cdf0fb4981fd520edc6759620cff20de

  • SHA512

    1592039e03d44f583d1e23e550407d210d768e31765610f51391fe62301dc45c3d003b8ca6ee6709fc83ab15762e79c859c9bc4ac76764bc853fb932e9de1dae

  • SSDEEP

    12288:GVEcpXoWDMzJvSpVDuvZHpDrBPZpDIK/QD2OBpEUV4S:GfXo/vSzqvXHvpDz/QD2Oru

Malware Config

Extracted

Family

vidar

Botnet

c0c7c802c4ec94ab4c7fcd88c588698c

C2

https://t.me/maslengdsa

https://steamcommunity.com/profiles/76561199786602107

https://t.me/lpnjoke

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

lumma

Targets

    • Target

      428443b4eec33a6f84f7f0968f4d2f67cdf0fb4981fd520edc6759620cff20de

    • Size

      571KB

    • MD5

      5954cc052f68abcdc9f2310ee5317b76

    • SHA1

      7d99ef2c31fd1577fad8306d0f895bbdc78a2493

    • SHA256

      428443b4eec33a6f84f7f0968f4d2f67cdf0fb4981fd520edc6759620cff20de

    • SHA512

      1592039e03d44f583d1e23e550407d210d768e31765610f51391fe62301dc45c3d003b8ca6ee6709fc83ab15762e79c859c9bc4ac76764bc853fb932e9de1dae

    • SSDEEP

      12288:GVEcpXoWDMzJvSpVDuvZHpDrBPZpDIK/QD2OBpEUV4S:GfXo/vSzqvXHvpDz/QD2Oru

    • Detect Vidar Stealer

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks