General
-
Target
GMBH_Bremen.2.1.zip
-
Size
169.4MB
-
Sample
250416-3ljbjsxsc1
-
MD5
190ffcea0308d68c6b1d9a9e2bf105c5
-
SHA1
cef0b5c4836c636432479795e11328241638e226
-
SHA256
2cc415a2842f99afca9b19c3a4d57d48cfa681cf389650c8a3b53d4fe0e0bca0
-
SHA512
2210a73360912a71a3d1a40316c8fb94afc838ba2c51fbf224c281709fbf6614fb8dc20d8b666bb8df7b6a5bc6cc521025801f42b4dabb5661b40402edbd8158
-
SSDEEP
3145728:lfZLrU3YWd/aFvTsEJzB3ZCXYk04Oa1fZLrU3YWd/aFAEJzB3ZCXYk04OU:lhUIfTd3ZCXYkLZhUIfzd3ZCXYkLd
Static task
static1
Behavioral task
behavioral1
Sample
Start_setup.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
Start_setup.exe
Resource
win11-20250410-en
Malware Config
Extracted
Protocol: ftp- Host:
64.52.80.157 - Port:
21 - Username:
SSA - Password:
PASS
Extracted
Protocol: ftp- Host:
188.120.227.9 - Port:
21 - Username:
PK1 - Password:
PK1
Extracted
lumma
https://asalaccgfa.top/gsooz
https://jawdedmirror.run/ewqd
https://changeaie.top/geps
https://lonfgshadow.live/xawi
https://liftally.top/xasj
https://nighetwhisper.top/lekd
https://salaccgfa.top/gsooz
https://zestmodp.top/zeda
https://owlflright.digital/qopy
Extracted
vidar
13.5
5e0c4261602b0cd231c9ba5491376d7b
https://t.me/v00rd
https://steamcommunity.com/profiles/76561199846773220
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Targets
-
-
Target
Start_setup.exe
-
Size
37KB
-
MD5
f6f76de82f4a87fcabbe011876e53670
-
SHA1
b7aec7f9870935daf1faba58aeb2a4deaeba116c
-
SHA256
a97e2a8da8d70d6f4e5df730b4fe7996e2d6b1cab9971faa4a8ec2857f1eecc9
-
SHA512
d089c54324467e120fe0040f78f01b663287b7082e70e37bb387b9bd12d94102786259f3318a7483a3edea634c07aa8aecbb10e749fbb1869ae827333f9ccad2
-
SSDEEP
768:xn04RNfdSXe28HjPxWlk0CoCzXtBi4PY//I0D3fmoxbxAuauIRdzOcSQbNC:h04f1SMHjZ0k/tB1g//I0DuoxbxAHsci
-
Detect Vidar Stealer
-
Lumma family
-
Vidar family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2