General

  • Target

    a48ea02e282b2b94e1a49a59fdc0b12f771aa384c04c9defefd4d4e205a3475c.exe

  • Size

    355KB

  • Sample

    240523-b98gsshe88

  • MD5

    861fa3a29b0724f3fcbbc724ed8ed5f6

  • SHA1

    d0d60644308e9ec12b8d3a2c1254470f3a1e816b

  • SHA256

    a48ea02e282b2b94e1a49a59fdc0b12f771aa384c04c9defefd4d4e205a3475c

  • SHA512

    d3891407de6c91fe16e4ef8914d1e0f7aa623ab1d94ad9ad028061d4d17414c12bec4b468e719ba18d5edc4d6e209017843265636106b488f61a9b74708463f4

  • SSDEEP

    6144:0PlPlgMF6peZUqbWi25LsiZqJuul5Rhy4qrZ/IxRKG1jCPDftA93M:09PlgMFg75iflf04q1QDKG1jylAJM

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      a48ea02e282b2b94e1a49a59fdc0b12f771aa384c04c9defefd4d4e205a3475c.exe

    • Size

      355KB

    • MD5

      861fa3a29b0724f3fcbbc724ed8ed5f6

    • SHA1

      d0d60644308e9ec12b8d3a2c1254470f3a1e816b

    • SHA256

      a48ea02e282b2b94e1a49a59fdc0b12f771aa384c04c9defefd4d4e205a3475c

    • SHA512

      d3891407de6c91fe16e4ef8914d1e0f7aa623ab1d94ad9ad028061d4d17414c12bec4b468e719ba18d5edc4d6e209017843265636106b488f61a9b74708463f4

    • SSDEEP

      6144:0PlPlgMF6peZUqbWi25LsiZqJuul5Rhy4qrZ/IxRKG1jCPDftA93M:09PlgMFg75iflf04q1QDKG1jylAJM

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Detect binaries embedding considerable number of MFA browser extension IDs.

    • Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.

    • Detects Windows executables referencing non-Windows User-Agents

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion

    • Detects executables containing potential Windows Defender anti-emulation checks

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks