General

  • Target

    bb1bf98277f2f971ef5dd3d084b76db78e415aa3e43f67c069908eb4fd959a45

  • Size

    2.0MB

  • Sample

    240520-x965maea76

  • MD5

    bb874688b123e8843616a022dff6720e

  • SHA1

    a9e1869608531551a033133e69a97dff68e51af7

  • SHA256

    bb1bf98277f2f971ef5dd3d084b76db78e415aa3e43f67c069908eb4fd959a45

  • SHA512

    ec25376b516f4ce0c558c877e0c6a0f1e5efcf6eed1c196d0a8006a57da0e914711eff86b9645c7ceec4d07febe591cbecbdc708e9b3b1263d2215169aee68d9

  • SSDEEP

    49152:IFno/jfcJtTF+TxMoxc1TU+j+dAzGkiT:IFno/jUtIuoITsdZT

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      bb1bf98277f2f971ef5dd3d084b76db78e415aa3e43f67c069908eb4fd959a45

    • Size

      2.0MB

    • MD5

      bb874688b123e8843616a022dff6720e

    • SHA1

      a9e1869608531551a033133e69a97dff68e51af7

    • SHA256

      bb1bf98277f2f971ef5dd3d084b76db78e415aa3e43f67c069908eb4fd959a45

    • SHA512

      ec25376b516f4ce0c558c877e0c6a0f1e5efcf6eed1c196d0a8006a57da0e914711eff86b9645c7ceec4d07febe591cbecbdc708e9b3b1263d2215169aee68d9

    • SSDEEP

      49152:IFno/jfcJtTF+TxMoxc1TU+j+dAzGkiT:IFno/jUtIuoITsdZT

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks