General

  • Target

    688be43c5df4f384feb809364feaf42a64988128bf8e873c3f7a3e31ab23d85a

  • Size

    2.0MB

  • Sample

    240522-zg6z9sga25

  • MD5

    d360ab70d33011e92130c42526f09a87

  • SHA1

    3336a3fb67eaecc85734cfed1ad18fae79f6409d

  • SHA256

    688be43c5df4f384feb809364feaf42a64988128bf8e873c3f7a3e31ab23d85a

  • SHA512

    9632ccacc5c85983fe57f72c766fcc39decf99601c6e8c51b05c78ba76bd5a8f57a6e9a3bab8272138edef7b0f094317c398b79cb20cac1be377bc54863b2c77

  • SSDEEP

    49152:7QzHt472DAJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHt6tIuoITsdZ

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      688be43c5df4f384feb809364feaf42a64988128bf8e873c3f7a3e31ab23d85a

    • Size

      2.0MB

    • MD5

      d360ab70d33011e92130c42526f09a87

    • SHA1

      3336a3fb67eaecc85734cfed1ad18fae79f6409d

    • SHA256

      688be43c5df4f384feb809364feaf42a64988128bf8e873c3f7a3e31ab23d85a

    • SHA512

      9632ccacc5c85983fe57f72c766fcc39decf99601c6e8c51b05c78ba76bd5a8f57a6e9a3bab8272138edef7b0f094317c398b79cb20cac1be377bc54863b2c77

    • SSDEEP

      49152:7QzHt472DAJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHt6tIuoITsdZ

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks