General

  • Target

    9bee1839332630cbc3b1574eb99f3e2c00c7f94622e13e3b2465e0c1cd30fe01

  • Size

    2.1MB

  • Sample

    240522-cbebqsgg8z

  • MD5

    e80400f40e148f56c7a8939afd9ce692

  • SHA1

    6d3f7c931086aea55842b88a4f01a3d4fec341c7

  • SHA256

    9bee1839332630cbc3b1574eb99f3e2c00c7f94622e13e3b2465e0c1cd30fe01

  • SHA512

    d80955c78718a9fbcd5b8da60a0b06536ca281b421626960a1274584e525768c2426745ab7b9cddc7d06eb04c89b7fd0cd84db8b9a7e41c67bc11550b69f0260

  • SSDEEP

    49152:N6uDuaS9refe0JtTF+TxMoxc1TU+j+dAzGwlrh:N6uKb9r0tIuoITsdZ

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      9bee1839332630cbc3b1574eb99f3e2c00c7f94622e13e3b2465e0c1cd30fe01

    • Size

      2.1MB

    • MD5

      e80400f40e148f56c7a8939afd9ce692

    • SHA1

      6d3f7c931086aea55842b88a4f01a3d4fec341c7

    • SHA256

      9bee1839332630cbc3b1574eb99f3e2c00c7f94622e13e3b2465e0c1cd30fe01

    • SHA512

      d80955c78718a9fbcd5b8da60a0b06536ca281b421626960a1274584e525768c2426745ab7b9cddc7d06eb04c89b7fd0cd84db8b9a7e41c67bc11550b69f0260

    • SSDEEP

      49152:N6uDuaS9refe0JtTF+TxMoxc1TU+j+dAzGwlrh:N6uKb9r0tIuoITsdZ

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks