General

  • Target

    718f3ddfb33000759e207ae9f4b3118b34ce44f794749993f660fdcdf4dab027.exe

  • Size

    423KB

  • Sample

    240522-b9kezagg3v

  • MD5

    5afb193b8db7087705eca19e6fd17350

  • SHA1

    961d484614c96070af1d5ba640899f4f95b64bba

  • SHA256

    718f3ddfb33000759e207ae9f4b3118b34ce44f794749993f660fdcdf4dab027

  • SHA512

    197c06628f4b2f2298639a77116a886e949cea574f86d217eed7421430fa7f02504bb9a2e1c6a29a0b2d306d12c7fbd1e3ecbeef60fcedc67cd6bb25c42709c7

  • SSDEEP

    6144:0qiuRraHLIo4V1p+a3VyZJ1PGor3dz1UKwETicnDQNk3KRks2P4f3P5CDaZwAZB6:6HLIoCo1zzNiKwEjnMCKRdH5o1AZm

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      718f3ddfb33000759e207ae9f4b3118b34ce44f794749993f660fdcdf4dab027.exe

    • Size

      423KB

    • MD5

      5afb193b8db7087705eca19e6fd17350

    • SHA1

      961d484614c96070af1d5ba640899f4f95b64bba

    • SHA256

      718f3ddfb33000759e207ae9f4b3118b34ce44f794749993f660fdcdf4dab027

    • SHA512

      197c06628f4b2f2298639a77116a886e949cea574f86d217eed7421430fa7f02504bb9a2e1c6a29a0b2d306d12c7fbd1e3ecbeef60fcedc67cd6bb25c42709c7

    • SSDEEP

      6144:0qiuRraHLIo4V1p+a3VyZJ1PGor3dz1UKwETicnDQNk3KRks2P4f3P5CDaZwAZB6:6HLIoCo1zzNiKwEjnMCKRdH5o1AZm

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Detect binaries embedding considerable number of MFA browser extension IDs.

    • Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.

    • Detects Windows executables referencing non-Windows User-Agents

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion

    • Detects executables containing potential Windows Defender anti-emulation checks

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks