General

  • Target

    2025-05-04_5cd0f5a49ae3e48cc55e9aa52537d963_agent-tesla_black-basta_cobalt-strike_darkgate_elex_luca-stealer

  • Size

    938KB

  • Sample

    250504-yaa4ksej6s

  • MD5

    5cd0f5a49ae3e48cc55e9aa52537d963

  • SHA1

    1367f42f88e6a1176385630eea93ec49dd9273dc

  • SHA256

    f0ad328b7809f4e123683980468fa6cccb4e32e68451ac9108f66ca26103b18f

  • SHA512

    3fbdaf895010a1410d34ae8eca0cb8ed4fc4071074eab27b0bc47d218ce2ef9d722b162ead3bdcb13f4dea7a34ede611c0da46d548b54321d676ebbcdd394a6f

  • SSDEEP

    24576:6qDEvCTbMWu7rQYlBQcBiT6rprG8aMOg:6TvC/MTQYxsWR7aMO

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://80.64.18.219/testmine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://80.64.18.219/testmine/random.exe

Extracted

Family

lumma

C2

https://vecturar.top/zsia

https://brandihx.run/lowp

https://viriatoe.live/laopx

https://exitiumt.digital/xane

https://opusculy.top/keaj

https://civitasu.run/werrp

https://scriptao.digital/vpep

https://praetori.live/vepr

https://rdisciplipna.top/eqwu

https://orjinalecza.net/lxaz

https://eczakozmetik.net/qop

https://orijinalecza.org/jub

https://tortoisgfe.top/paxk

https://eczamedikal.org/vax

https://orijinalecza.net/kazd

https://medicalbitkisel.net/juj

https://snakejh.top/adsk

https://baseurzv.run/asuz

Extracted

Family

gcleaner

C2

45.91.200.135

Extracted

Family

vidar

Version

13.6

Botnet

67fbfb451f5f631daf82f1ea6227222f

C2

https://t.me/m00f3r

https://steamcommunity.com/profiles/76561199851454339

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0

Extracted

Family

phorphiex

C2

http://185.156.72.39

185.156.72.39

Targets

    • Target

      2025-05-04_5cd0f5a49ae3e48cc55e9aa52537d963_agent-tesla_black-basta_cobalt-strike_darkgate_elex_luca-stealer

    • Size

      938KB

    • MD5

      5cd0f5a49ae3e48cc55e9aa52537d963

    • SHA1

      1367f42f88e6a1176385630eea93ec49dd9273dc

    • SHA256

      f0ad328b7809f4e123683980468fa6cccb4e32e68451ac9108f66ca26103b18f

    • SHA512

      3fbdaf895010a1410d34ae8eca0cb8ed4fc4071074eab27b0bc47d218ce2ef9d722b162ead3bdcb13f4dea7a34ede611c0da46d548b54321d676ebbcdd394a6f

    • SSDEEP

      24576:6qDEvCTbMWu7rQYlBQcBiT6rprG8aMOg:6TvC/MTQYxsWR7aMO

    • Detect Vidar Stealer

    • Detects Healer an antivirus disabler dropper

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • Gcleaner family

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Modifies Windows Defender DisableAntiSpyware settings

    • Modifies Windows Defender Real-time Protection settings

    • Modifies Windows Defender TamperProtection settings

    • Modifies Windows Defender notification settings

    • Phorphiex family

    • Phorphiex payload

    • Phorphiex, Phorpiex

      Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Stops running service(s)

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks