General

  • Target

    207fb4aeffd47811049fe5c6366f09f70b859c6987883dcd9244a915af91a342_NeikiAnalytics.exe

  • Size

    4.4MB

  • Sample

    240630-2s34vs1fpm

  • MD5

    4a8099ca44ad78fa5414bab4f54ba030

  • SHA1

    ad1e9ee328d7eb870ebdaf9cf592a183f838f459

  • SHA256

    207fb4aeffd47811049fe5c6366f09f70b859c6987883dcd9244a915af91a342

  • SHA512

    b1f905210d372c8352c07ea6c27bd71f12f7ee3a1e40375925bc6cb295b08d07d5bd9407e4da6e7d303a0951fb19e060a652951bfdf67f1151f19720e8698d03

  • SSDEEP

    49152:0fhvX07qcsIUv5z95W+diSQJAoCWFf4z6X5MS/tl3odglPCpgVS84OH:+hc7qcvWzE4OX53C+V5r

Malware Config

Extracted

Family

vidar

C2

https://t.me/g067n

https://steamcommunity.com/profiles/76561199707802586

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0

Extracted

Family

lumma

C2

https://potterryisiw.shop/api

https://foodypannyjsud.shop/api

https://contintnetksows.shop/api

https://reinforcedirectorywd.shop/api

Targets

    • Target

      207fb4aeffd47811049fe5c6366f09f70b859c6987883dcd9244a915af91a342_NeikiAnalytics.exe

    • Size

      4.4MB

    • MD5

      4a8099ca44ad78fa5414bab4f54ba030

    • SHA1

      ad1e9ee328d7eb870ebdaf9cf592a183f838f459

    • SHA256

      207fb4aeffd47811049fe5c6366f09f70b859c6987883dcd9244a915af91a342

    • SHA512

      b1f905210d372c8352c07ea6c27bd71f12f7ee3a1e40375925bc6cb295b08d07d5bd9407e4da6e7d303a0951fb19e060a652951bfdf67f1151f19720e8698d03

    • SSDEEP

      49152:0fhvX07qcsIUv5z95W+diSQJAoCWFf4z6X5MS/tl3odglPCpgVS84OH:+hc7qcvWzE4OX53C+V5r

    • Detect Vidar Stealer

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks