General

  • Target

    6cb9b55719f469b27ea2e00ec9e033a095fe2082c672184b79c3a94fbab877b5.exe

  • Size

    2.0MB

  • Sample

    240522-xzk5eadc9t

  • MD5

    3d2827a97619c3aad1e1c03444df8c41

  • SHA1

    4e29ca126bbd255d7ece151d937edbe12df43ee9

  • SHA256

    6cb9b55719f469b27ea2e00ec9e033a095fe2082c672184b79c3a94fbab877b5

  • SHA512

    eda7b7f2a27c7391f5db2ec7fe3e256e95444859f6fb9f2421fd233b127eeb2ce18b64612bca9150fa957b76feebf0ae388949cc601d274292648e44ee0390c7

  • SSDEEP

    49152:7QzHt472D3JtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtZtIuoITsdZ

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      6cb9b55719f469b27ea2e00ec9e033a095fe2082c672184b79c3a94fbab877b5.exe

    • Size

      2.0MB

    • MD5

      3d2827a97619c3aad1e1c03444df8c41

    • SHA1

      4e29ca126bbd255d7ece151d937edbe12df43ee9

    • SHA256

      6cb9b55719f469b27ea2e00ec9e033a095fe2082c672184b79c3a94fbab877b5

    • SHA512

      eda7b7f2a27c7391f5db2ec7fe3e256e95444859f6fb9f2421fd233b127eeb2ce18b64612bca9150fa957b76feebf0ae388949cc601d274292648e44ee0390c7

    • SSDEEP

      49152:7QzHt472D3JtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtZtIuoITsdZ

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks