General

  • Target

    83311b81ef97815b4751c8683d7aaf16f15589d470d359d36259d80748e7ad4c

  • Size

    2.1MB

  • Sample

    240521-sb7laahh4v

  • MD5

    af73fc02520ba551b7308abbae99042c

  • SHA1

    3550d1e297f6718baebc93c2734fc86f7c3c8c85

  • SHA256

    83311b81ef97815b4751c8683d7aaf16f15589d470d359d36259d80748e7ad4c

  • SHA512

    c1a1c71075130b175839956dc1bb68b0f44de2e545881f4ac19ed98a52e3b8602679721a4b34f7bc85ef840711a945aaac4ddcfb9118491e9b1c48c203525e4c

  • SSDEEP

    49152:N6uDuaS9refusJtTF+TxMoxc1TU+j+dAzGwlrh:N6uKb9rstIuoITsdZ

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      83311b81ef97815b4751c8683d7aaf16f15589d470d359d36259d80748e7ad4c

    • Size

      2.1MB

    • MD5

      af73fc02520ba551b7308abbae99042c

    • SHA1

      3550d1e297f6718baebc93c2734fc86f7c3c8c85

    • SHA256

      83311b81ef97815b4751c8683d7aaf16f15589d470d359d36259d80748e7ad4c

    • SHA512

      c1a1c71075130b175839956dc1bb68b0f44de2e545881f4ac19ed98a52e3b8602679721a4b34f7bc85ef840711a945aaac4ddcfb9118491e9b1c48c203525e4c

    • SSDEEP

      49152:N6uDuaS9refusJtTF+TxMoxc1TU+j+dAzGwlrh:N6uKb9rstIuoITsdZ

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks