General

  • Target

    2025-03-29_18e5e760b807fc2b05172215540398b3_black-basta_cobalt-strike_ryuk_satacom

  • Size

    736KB

  • Sample

    250329-x7e85assfs

  • MD5

    18e5e760b807fc2b05172215540398b3

  • SHA1

    6a1b4d3227088473c45869469b68a1737b26b90d

  • SHA256

    6cff9733bcd32c2af2da61eab8281cd412a6d208ce6b763b783157be2901d5bd

  • SHA512

    23430597753696466eea1c54337b1d37a734918433be2e0637aaf022c0ef09d5f8b04a3793ccb1a296bb83d13fda832d677cb926730653d78b0833f96737fa04

  • SSDEEP

    12288:oaQ9+ICJkAp0mBpehM8ppy+E4J/aDQy5b4WeZGl/GtWV3OnP3cqXoi8TMkoleH5/:cw4GBpehMjcuP5b4FtyU/oiwMTleHKLu

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://77.90.153.241

Attributes
  • url_path

    /612acd258782ade8.php

Extracted

Family

vidar

Version

13.3

Botnet

928af183c2a2807a3c0526e8c0c9369d

C2

https://t.me/lw25chm

https://steamcommunity.com/profiles/76561199839170361

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0

Extracted

Family

lumma

C2

https://wxayfarer.live/ALosnz

https://byteplusx.digital/aXweAX

https://travewlio.shop/ZNxbHi

https://skynetxc.live/AksoPA

https://pixtreev.run/LkaUz

https://advennture.top/GKsiio

https://atargett.top/dsANGt

https://70sparkiob.digital/KeASUp

https://appgridn.live/LEjdAK

Targets

    • Target

      2025-03-29_18e5e760b807fc2b05172215540398b3_black-basta_cobalt-strike_ryuk_satacom

    • Size

      736KB

    • MD5

      18e5e760b807fc2b05172215540398b3

    • SHA1

      6a1b4d3227088473c45869469b68a1737b26b90d

    • SHA256

      6cff9733bcd32c2af2da61eab8281cd412a6d208ce6b763b783157be2901d5bd

    • SHA512

      23430597753696466eea1c54337b1d37a734918433be2e0637aaf022c0ef09d5f8b04a3793ccb1a296bb83d13fda832d677cb926730653d78b0833f96737fa04

    • SSDEEP

      12288:oaQ9+ICJkAp0mBpehM8ppy+E4J/aDQy5b4WeZGl/GtWV3OnP3cqXoi8TMkoleH5/:cw4GBpehMjcuP5b4FtyU/oiwMTleHKLu

    • Detect Vidar Stealer

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks