General

  • Target

    bd19fc03b7de2b1489e67944d221f37b.bin

  • Size

    295KB

  • Sample

    240517-ds2n2aeg9w

  • MD5

    baa96f24016f7fb3d8f71b745cfdb644

  • SHA1

    23086cf84299d6977c7cc216ea2fe5f74ecf90b2

  • SHA256

    1c4c72e8e0391926b4d7b7e773925d53d132f638c9544ca84f7403cce5c10e20

  • SHA512

    c29ccacfffd610457e7e83523fcbc0e3a93dc62e438afe39bc161d450fe3dada4a43160c2434bd0147a4ca046a578172caa1996f7b179d1324d60fa3d914739a

  • SSDEEP

    6144:zs+bZp4ycnxED48/FUAi2CQeWlWvTe3G+SHHA35r:5p47nSDl/WhVQp26zSHHApr

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      c49f3891c5f1168f59eccfec2dfd503fda8f321a7a7cfc81e1edad027854edc0.exe

    • Size

      377KB

    • MD5

      bd19fc03b7de2b1489e67944d221f37b

    • SHA1

      7046b966d868ccfbb5a5ae14c1a448771c4675ff

    • SHA256

      c49f3891c5f1168f59eccfec2dfd503fda8f321a7a7cfc81e1edad027854edc0

    • SHA512

      15f235b10579ca4779784ac412d33dee74e681bcba4def798aca3f4f94638f3ba5d196eb9078cdfaafeed61073c815e9cc9a53c762d28498787b951f6e58fd05

    • SSDEEP

      6144:0aUkK6bywW0nlLbFqrcB+BGiq9rDPnCLNTWKIFxXRZYg8lVZQekb4n16pqG+3oe:0VAbTW0nlLoI4QnCyFxSlD8b4nQN

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks