General

  • Target

    9a2ba0aa8544324f42c1da9ba9e42311ce1b0b0ea0b9bc0b09e8e2202ca63745

  • Size

    2.0MB

  • Sample

    240523-eqg3aadd6t

  • MD5

    990054abc654b10cec1a99ba9874df82

  • SHA1

    885a67444f073f4a82543e711bbd36205be71ffc

  • SHA256

    9a2ba0aa8544324f42c1da9ba9e42311ce1b0b0ea0b9bc0b09e8e2202ca63745

  • SHA512

    e0a58a87f9594762b979e35054288df973c315441fe2e1eb53180d6a2e107db7702b0590064b39cfb47f167a20f7829a21c46277d15d3215d1e91d1e2dbe7939

  • SSDEEP

    49152:7QzHt472DJJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtHtIuoITsdZ

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      9a2ba0aa8544324f42c1da9ba9e42311ce1b0b0ea0b9bc0b09e8e2202ca63745

    • Size

      2.0MB

    • MD5

      990054abc654b10cec1a99ba9874df82

    • SHA1

      885a67444f073f4a82543e711bbd36205be71ffc

    • SHA256

      9a2ba0aa8544324f42c1da9ba9e42311ce1b0b0ea0b9bc0b09e8e2202ca63745

    • SHA512

      e0a58a87f9594762b979e35054288df973c315441fe2e1eb53180d6a2e107db7702b0590064b39cfb47f167a20f7829a21c46277d15d3215d1e91d1e2dbe7939

    • SSDEEP

      49152:7QzHt472DJJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtHtIuoITsdZ

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks