General

  • Target

    53bd2c768909ff79fa0a51c66d069cd8e032854934e4e3fd78f6b7f2ad740b7e

  • Size

    1.8MB

  • Sample

    240523-fb9z7aeb6z

  • MD5

    58770eb5bedf4fc2dab2db6ddc290c04

  • SHA1

    4f6389348b0d50171081cd0aeb67eead61b9ab3a

  • SHA256

    53bd2c768909ff79fa0a51c66d069cd8e032854934e4e3fd78f6b7f2ad740b7e

  • SHA512

    db37949bed7994ba7f0383bc4a664716b8cbd6f340173284fd9b996018210e18983e0c31542f19f41aa5a643890914b5cec57fe004b3d535e404c7c2def7a938

  • SSDEEP

    24576:FBfuZfeq6slO6hTdtTF+TxMoxQH1Tj4wtjYZH1DmoYYzi3WH45yv+OueSJhm9e:F7qF3JtTF+TxMoxc1TU+j+dAzGwlrh

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      53bd2c768909ff79fa0a51c66d069cd8e032854934e4e3fd78f6b7f2ad740b7e

    • Size

      1.8MB

    • MD5

      58770eb5bedf4fc2dab2db6ddc290c04

    • SHA1

      4f6389348b0d50171081cd0aeb67eead61b9ab3a

    • SHA256

      53bd2c768909ff79fa0a51c66d069cd8e032854934e4e3fd78f6b7f2ad740b7e

    • SHA512

      db37949bed7994ba7f0383bc4a664716b8cbd6f340173284fd9b996018210e18983e0c31542f19f41aa5a643890914b5cec57fe004b3d535e404c7c2def7a938

    • SSDEEP

      24576:FBfuZfeq6slO6hTdtTF+TxMoxQH1Tj4wtjYZH1DmoYYzi3WH45yv+OueSJhm9e:F7qF3JtTF+TxMoxc1TU+j+dAzGwlrh

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks