General
-
Target
setup.exe
-
Size
2.8MB
-
Sample
240511-wj8ebsac7v
-
MD5
b27e51a6dc4065e25c5aabaf120aa463
-
SHA1
43b49d435183b27dc6c9b06c596b3db8d92d9c49
-
SHA256
83b0a9611b9bb5ebd1de0ea48d465705f2ad9e13af9dbc65d0c6c4b2a4081eb6
-
SHA512
5c03d40300a6932d42beb18a57fde4285a86b8d8e4b44ec3cfeadf6fb137c8135313dd2f54e753b840b3a6e190f74deefbf79c7461d10ce9841dd54f47255efe
-
SSDEEP
49152:CWz0ly6XP1/a/lRCK3qaKqqUVEIKQy9aO5ywJ/GmmFfltkFOxUy1Ep28TAWa:DzT6+XC6qa8IZhW/GmmFflHx7Sp2RW
Malware Config
Extracted
stealc
Extracted
vidar
9.6
681a223bec180ebfdc48547d3d5bd784
https://steamcommunity.com/profiles/76561199681720597
https://t.me/talmatin
-
profile_id_v2
681a223bec180ebfdc48547d3d5bd784
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36 OPR/101.0.0.0
Targets
-
-
Target
setup.exe
-
Size
2.8MB
-
MD5
b27e51a6dc4065e25c5aabaf120aa463
-
SHA1
43b49d435183b27dc6c9b06c596b3db8d92d9c49
-
SHA256
83b0a9611b9bb5ebd1de0ea48d465705f2ad9e13af9dbc65d0c6c4b2a4081eb6
-
SHA512
5c03d40300a6932d42beb18a57fde4285a86b8d8e4b44ec3cfeadf6fb137c8135313dd2f54e753b840b3a6e190f74deefbf79c7461d10ce9841dd54f47255efe
-
SSDEEP
49152:CWz0ly6XP1/a/lRCK3qaKqqUVEIKQy9aO5ywJ/GmmFfltkFOxUy1Ep28TAWa:DzT6+XC6qa8IZhW/GmmFflHx7Sp2RW
-
Detect Vidar Stealer
-
Detect ZGRat V1
-
Modifies firewall policy service
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1