General

  • Target

    VegaStealer_v1.bin.zip

  • Size

    6.7MB

  • Sample

    231011-zpfs2sch61

  • MD5

    0bff307fd3b86ebcb8a6dffa555d7062

  • SHA1

    ad56438898ff8be6e2dfe53d9ba1cb0e433691b3

  • SHA256

    818990fafe6019b9d39d7d3cc5514c1451de5474e73b570d4405f63554055e1c

  • SHA512

    30c5be70641bc3b8c7d4c4dc54eb147b9e9b855dde1677bfbe2f1f7d3d8f8ea1f0f3b3a80e4a2fe80083db4ebbb9a2e542cc5178f13fb17bfc1e746600ff22b3

  • SSDEEP

    196608:uSSKjk1mW9DRUJtYYbVJh6/Q1NYyZCn+Y/H/W+Ey:5JjnWgtYYF6/Q1M+8/W+b

Malware Config

Targets

    • Target

      VegaStealer_v1.bin

    • Size

      6.7MB

    • MD5

      41b8caca7e2c1ec36c2528fcd6a3f334

    • SHA1

      45ef2451a4916cf5c88e90eb1e4360f04ba3549e

    • SHA256

      c59fdd5b90add682937cc8dfccfb84d460ea9f14c3dc9df895a0b8596877fb16

    • SHA512

      f160616571478eb55fb6a61c94961c7c47b0db56f03638918641fdfbc505e929921b88a9059d44554edee6e6a1c4e73127c0db0fe9df0df8d69ac73f9fa4599f

    • SSDEEP

      196608:Rrp3ECTkyi+4l72FW1aq3BzV+gSYyPO6GEkhQAp6UFj4:VHw/lqFWYq3lV+gSYyP3GEkmJ

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks