General

  • Target

    e8d3f8d2eed68c24edb3d8e83fa79dc73e9d4ef758e996c381da6f3258daf4e6

  • Size

    2.0MB

  • Sample

    240522-nvvnlsdf69

  • MD5

    2742f8c319df53a1e335b40dc3e8772c

  • SHA1

    134bf9e0a438cbd65c57668a954b12ee2b821374

  • SHA256

    e8d3f8d2eed68c24edb3d8e83fa79dc73e9d4ef758e996c381da6f3258daf4e6

  • SHA512

    38b1b55b1bea2cad69bb88d1dad3735fbb81059aba1b0f10d762fda93bd3a0762b505749897eba017d58a316fe1aadfb60e114f3612ab150c6000c25b43567d5

  • SSDEEP

    49152:7QzHt472DaJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtUtIuoITsdZ

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      e8d3f8d2eed68c24edb3d8e83fa79dc73e9d4ef758e996c381da6f3258daf4e6

    • Size

      2.0MB

    • MD5

      2742f8c319df53a1e335b40dc3e8772c

    • SHA1

      134bf9e0a438cbd65c57668a954b12ee2b821374

    • SHA256

      e8d3f8d2eed68c24edb3d8e83fa79dc73e9d4ef758e996c381da6f3258daf4e6

    • SHA512

      38b1b55b1bea2cad69bb88d1dad3735fbb81059aba1b0f10d762fda93bd3a0762b505749897eba017d58a316fe1aadfb60e114f3612ab150c6000c25b43567d5

    • SSDEEP

      49152:7QzHt472DaJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtUtIuoITsdZ

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks