General

  • Target

    52b70e93f94a283fc21c250db083e78fa3b7b0da91e21c7f6ac89cde730638fa_NeikiAnalytics

  • Size

    363KB

  • Sample

    240521-qfystsfb6t

  • MD5

    24e3ece1b4afc35debc48f9ce66838a6

  • SHA1

    cdd5cf73dc063cd659a86b49c489145eabe9f014

  • SHA256

    52b70e93f94a283fc21c250db083e78fa3b7b0da91e21c7f6ac89cde730638fa

  • SHA512

    80dad60fc2e3b53397cc00c1392e6f0d7792c564a840281e6fa19c4d737aa445a313b3d03804db254d0fae71f4ceaeacbf52b3857c38d193e3e6be3e53ed1fbd

  • SSDEEP

    6144:8B9LSp8zWMtAJAiDUw6wJb3kH/XVWvcQU/Hvt5YzfBtnCZa6n:ULSpmlw6wF0HdWvVAH15yIFn

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      52b70e93f94a283fc21c250db083e78fa3b7b0da91e21c7f6ac89cde730638fa_NeikiAnalytics

    • Size

      363KB

    • MD5

      24e3ece1b4afc35debc48f9ce66838a6

    • SHA1

      cdd5cf73dc063cd659a86b49c489145eabe9f014

    • SHA256

      52b70e93f94a283fc21c250db083e78fa3b7b0da91e21c7f6ac89cde730638fa

    • SHA512

      80dad60fc2e3b53397cc00c1392e6f0d7792c564a840281e6fa19c4d737aa445a313b3d03804db254d0fae71f4ceaeacbf52b3857c38d193e3e6be3e53ed1fbd

    • SSDEEP

      6144:8B9LSp8zWMtAJAiDUw6wJb3kH/XVWvcQU/Hvt5YzfBtnCZa6n:ULSpmlw6wF0HdWvVAH15yIFn

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks