General

  • Target

    0e3282299e8f2f8f0846f7f62e2aa2630bff3c1f9f63254a7dec7ca2254e9d49

  • Size

    2.0MB

  • Sample

    240522-xw995adc3v

  • MD5

    51d67d469f3e921c8651b98eb8902f1c

  • SHA1

    1940667e192ee5ea367b2a862fc1f68acab5cebc

  • SHA256

    0e3282299e8f2f8f0846f7f62e2aa2630bff3c1f9f63254a7dec7ca2254e9d49

  • SHA512

    5b4247c090a61178eb7092c0c0b98dce699a7bb66b806efc8ba1b75d682c5fc5b4ba7da1da63106fec8385f56cac7a2ba92d12ceba4adfbd1ceda0a244e13c3e

  • SSDEEP

    49152:7QzHt472D8JtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtKtIuoITsdZ

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      0e3282299e8f2f8f0846f7f62e2aa2630bff3c1f9f63254a7dec7ca2254e9d49

    • Size

      2.0MB

    • MD5

      51d67d469f3e921c8651b98eb8902f1c

    • SHA1

      1940667e192ee5ea367b2a862fc1f68acab5cebc

    • SHA256

      0e3282299e8f2f8f0846f7f62e2aa2630bff3c1f9f63254a7dec7ca2254e9d49

    • SHA512

      5b4247c090a61178eb7092c0c0b98dce699a7bb66b806efc8ba1b75d682c5fc5b4ba7da1da63106fec8385f56cac7a2ba92d12ceba4adfbd1ceda0a244e13c3e

    • SSDEEP

      49152:7QzHt472D8JtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtKtIuoITsdZ

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks