General

  • Target

    10ba7d7ff71bf707d29b7e14251de759ba6277d6ca1a85113d6b110e8c43efbf

  • Size

    1.8MB

  • Sample

    240523-fdb6yaeb9y

  • MD5

    36e21f6f4d61bcb0376ae5450021f04d

  • SHA1

    d63c029b9e5a8b6e32fd399f17125a3a4e08cfcc

  • SHA256

    10ba7d7ff71bf707d29b7e14251de759ba6277d6ca1a85113d6b110e8c43efbf

  • SHA512

    f5ed203348b9fa4f75f0bf4751a4a1a2302fb5978473744b79d112728883e48e6e745e58ff430d7a34347e523cf1ac1f2e499e3d269e5cdec5729381108f964e

  • SSDEEP

    24576:FBfuZfeq6sJO6hTdtTF+TxMoxQH1Tj4wtjYZH1DmoYYzi3WH45yv+OueSJhm9e:F7qFTJtTF+TxMoxc1TU+j+dAzGwlrh

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      10ba7d7ff71bf707d29b7e14251de759ba6277d6ca1a85113d6b110e8c43efbf

    • Size

      1.8MB

    • MD5

      36e21f6f4d61bcb0376ae5450021f04d

    • SHA1

      d63c029b9e5a8b6e32fd399f17125a3a4e08cfcc

    • SHA256

      10ba7d7ff71bf707d29b7e14251de759ba6277d6ca1a85113d6b110e8c43efbf

    • SHA512

      f5ed203348b9fa4f75f0bf4751a4a1a2302fb5978473744b79d112728883e48e6e745e58ff430d7a34347e523cf1ac1f2e499e3d269e5cdec5729381108f964e

    • SSDEEP

      24576:FBfuZfeq6sJO6hTdtTF+TxMoxQH1Tj4wtjYZH1DmoYYzi3WH45yv+OueSJhm9e:F7qFTJtTF+TxMoxc1TU+j+dAzGwlrh

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks