General

  • Target

    75d3612b324e57b29755f8bee2dfe6372ff171ce161fa9f2bebcfb4bc8f05972

  • Size

    2.1MB

  • Sample

    240522-dldzdsad7v

  • MD5

    a760af5f48962d6a6152c2dd0cb3bd56

  • SHA1

    cde8e2a62a4feb5d7559eeee649196568d1e7ade

  • SHA256

    75d3612b324e57b29755f8bee2dfe6372ff171ce161fa9f2bebcfb4bc8f05972

  • SHA512

    2cda1731e286f178c7ecc9550d149ce1df3dd91bb1457e0149e0867167c5c237e620c0bff1534e72d9f60773a08964ed265ab8cf5de99d7114094f8e50bc0b82

  • SSDEEP

    49152:N6uDuaS9refKAJtTF+TxMoxc1TU+j+dAzGwlrh:N6uKb9XAtIuoITsdZ

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      75d3612b324e57b29755f8bee2dfe6372ff171ce161fa9f2bebcfb4bc8f05972

    • Size

      2.1MB

    • MD5

      a760af5f48962d6a6152c2dd0cb3bd56

    • SHA1

      cde8e2a62a4feb5d7559eeee649196568d1e7ade

    • SHA256

      75d3612b324e57b29755f8bee2dfe6372ff171ce161fa9f2bebcfb4bc8f05972

    • SHA512

      2cda1731e286f178c7ecc9550d149ce1df3dd91bb1457e0149e0867167c5c237e620c0bff1534e72d9f60773a08964ed265ab8cf5de99d7114094f8e50bc0b82

    • SSDEEP

      49152:N6uDuaS9refKAJtTF+TxMoxc1TU+j+dAzGwlrh:N6uKb9XAtIuoITsdZ

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks