General

  • Target

    cb5df87530d0a5475b11bafea977abf756f1a791793116b8f94a247467ff6077

  • Size

    580KB

  • Sample

    241009-ds8scatcmg

  • MD5

    d74404ef025b3afbb1844159e5efd5cd

  • SHA1

    0a49837583de21650a1dbdaca3a3fe885d8369e6

  • SHA256

    cb5df87530d0a5475b11bafea977abf756f1a791793116b8f94a247467ff6077

  • SHA512

    868e6a4f5c69a35d317a0fec32d4646f179556dcf018968613948c791f14f26839c93017c4ca8eff3063bc91310a5cdfdb0282dd80b32970e242938630839309

  • SSDEEP

    12288:mK/vg3InPBniz+b7UzGf8aJGaYRVvbl12YYxaaIFw2B1urKw:mKg3IPjnmUxJG5blkYvaIip

Malware Config

Extracted

Family

vidar

C2

http://lade.petperfectcare.com:80

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

lumma

Targets

    • Target

      cb5df87530d0a5475b11bafea977abf756f1a791793116b8f94a247467ff6077

    • Size

      580KB

    • MD5

      d74404ef025b3afbb1844159e5efd5cd

    • SHA1

      0a49837583de21650a1dbdaca3a3fe885d8369e6

    • SHA256

      cb5df87530d0a5475b11bafea977abf756f1a791793116b8f94a247467ff6077

    • SHA512

      868e6a4f5c69a35d317a0fec32d4646f179556dcf018968613948c791f14f26839c93017c4ca8eff3063bc91310a5cdfdb0282dd80b32970e242938630839309

    • SSDEEP

      12288:mK/vg3InPBniz+b7UzGf8aJGaYRVvbl12YYxaaIFw2B1urKw:mKg3IPjnmUxJG5blkYvaIip

    • Detect Vidar Stealer

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks