General

  • Target

    499d3fe234fccd8978cdc7263b54f719464050cd7e633ce6a64ee4acda9f67d0

  • Size

    1.8MB

  • Sample

    240523-f4sllsfb4y

  • MD5

    abe4e9fa070e244608de5b4399b4a68b

  • SHA1

    1fd797344cf1f2a5eb5d5caefe3af74716c0909e

  • SHA256

    499d3fe234fccd8978cdc7263b54f719464050cd7e633ce6a64ee4acda9f67d0

  • SHA512

    1f5d1c4e06c718cb3aa0fdeffdbffc08cf9d1f7b9f4c68a282413f58d167b2ba4f849b0ebd69aef778f6f0cb13c71eaa73cc277f5597e9abef29f920ab054a3d

  • SSDEEP

    24576:FBfuZfeq6sBO6hTdtTF+TxMoxQH1Tj4wtjYZH1DmoYYzi3WH45yv+OueSJhm9e:F7qFLJtTF+TxMoxc1TU+j+dAzGwlrh

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      499d3fe234fccd8978cdc7263b54f719464050cd7e633ce6a64ee4acda9f67d0

    • Size

      1.8MB

    • MD5

      abe4e9fa070e244608de5b4399b4a68b

    • SHA1

      1fd797344cf1f2a5eb5d5caefe3af74716c0909e

    • SHA256

      499d3fe234fccd8978cdc7263b54f719464050cd7e633ce6a64ee4acda9f67d0

    • SHA512

      1f5d1c4e06c718cb3aa0fdeffdbffc08cf9d1f7b9f4c68a282413f58d167b2ba4f849b0ebd69aef778f6f0cb13c71eaa73cc277f5597e9abef29f920ab054a3d

    • SSDEEP

      24576:FBfuZfeq6sBO6hTdtTF+TxMoxQH1Tj4wtjYZH1DmoYYzi3WH45yv+OueSJhm9e:F7qFLJtTF+TxMoxc1TU+j+dAzGwlrh

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks