General

  • Target

    VegaStealer_v1.exe

  • Size

    6.7MB

  • Sample

    231011-2zfxxaae6x

  • MD5

    41b8caca7e2c1ec36c2528fcd6a3f334

  • SHA1

    45ef2451a4916cf5c88e90eb1e4360f04ba3549e

  • SHA256

    c59fdd5b90add682937cc8dfccfb84d460ea9f14c3dc9df895a0b8596877fb16

  • SHA512

    f160616571478eb55fb6a61c94961c7c47b0db56f03638918641fdfbc505e929921b88a9059d44554edee6e6a1c4e73127c0db0fe9df0df8d69ac73f9fa4599f

  • SSDEEP

    196608:Rrp3ECTkyi+4l72FW1aq3BzV+gSYyPO6GEkhQAp6UFj4:VHw/lqFWYq3lV+gSYyP3GEkmJ

Malware Config

Targets

    • Target

      VegaStealer_v1.exe

    • Size

      6.7MB

    • MD5

      41b8caca7e2c1ec36c2528fcd6a3f334

    • SHA1

      45ef2451a4916cf5c88e90eb1e4360f04ba3549e

    • SHA256

      c59fdd5b90add682937cc8dfccfb84d460ea9f14c3dc9df895a0b8596877fb16

    • SHA512

      f160616571478eb55fb6a61c94961c7c47b0db56f03638918641fdfbc505e929921b88a9059d44554edee6e6a1c4e73127c0db0fe9df0df8d69ac73f9fa4599f

    • SSDEEP

      196608:Rrp3ECTkyi+4l72FW1aq3BzV+gSYyPO6GEkhQAp6UFj4:VHw/lqFWYq3lV+gSYyP3GEkmJ

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks