General

  • Target

    4363355d38b8c16d8b195c9f3d74a15dba8fd16088dcda9d6baab2d6cf74fefe

  • Size

    349KB

  • Sample

    240509-2tlwzaef23

  • MD5

    71902cf0487ded744664dfa274bcdfe7

  • SHA1

    516463a9324c3a8628a5cc023216dc68ee145be1

  • SHA256

    4363355d38b8c16d8b195c9f3d74a15dba8fd16088dcda9d6baab2d6cf74fefe

  • SHA512

    1ee0fe57ceb84691a71c965255dfc886ccc3cba10445754d31b01c4945b5c11411e099d4a65c97dfb40e7bff50ec34a4b0c6410b3413eca96e880e8da683ef24

  • SSDEEP

    6144:hqv0WajNb3hJzVIcizgLfH1BYfhYda7b1sHKN5MKLjLmt:mqb3LC41BYiusHY5MK6t

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

Version

9.4

Botnet

ad7dbf02afc50b46afd33ddc12f41082

C2

https://steamcommunity.com/profiles/76561199680449169

https://t.me/r1g1o

Attributes
  • profile_id_v2

    ad7dbf02afc50b46afd33ddc12f41082

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36 OPR/101.0.0.0

Targets

    • Target

      4363355d38b8c16d8b195c9f3d74a15dba8fd16088dcda9d6baab2d6cf74fefe

    • Size

      349KB

    • MD5

      71902cf0487ded744664dfa274bcdfe7

    • SHA1

      516463a9324c3a8628a5cc023216dc68ee145be1

    • SHA256

      4363355d38b8c16d8b195c9f3d74a15dba8fd16088dcda9d6baab2d6cf74fefe

    • SHA512

      1ee0fe57ceb84691a71c965255dfc886ccc3cba10445754d31b01c4945b5c11411e099d4a65c97dfb40e7bff50ec34a4b0c6410b3413eca96e880e8da683ef24

    • SSDEEP

      6144:hqv0WajNb3hJzVIcizgLfH1BYfhYda7b1sHKN5MKLjLmt:mqb3LC41BYiusHY5MK6t

    • Detect Vidar Stealer

    • Detect ZGRat V1

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks