General

  • Target

    246add13dc493aecc7751ca42ee0cda88c0c4bc0261c1be5b62f17d31d7c1b33

  • Size

    1.8MB

  • Sample

    240523-jhnx3shf75

  • MD5

    9ae735dfed7f4c2843ef466e19429a2e

  • SHA1

    16316e1cf27dfa51c590337d695d32f8d4f1297c

  • SHA256

    246add13dc493aecc7751ca42ee0cda88c0c4bc0261c1be5b62f17d31d7c1b33

  • SHA512

    6f17a9436e9e7b5987f6772ae0e429239cba402121c46b402cf8c163cd37b019f5e4a166fbd205690dc7d7832dbfe5d4af1a8226a1236ad90601400a379f8d50

  • SSDEEP

    24576:FBfuZfeq6sNO6hTdtTF+TxMoxQH1Tj4wtjYZH1DmoYYzi3WH45yv+OueSJhm9e:F7qFfJtTF+TxMoxc1TU+j+dAzGwlrh

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      246add13dc493aecc7751ca42ee0cda88c0c4bc0261c1be5b62f17d31d7c1b33

    • Size

      1.8MB

    • MD5

      9ae735dfed7f4c2843ef466e19429a2e

    • SHA1

      16316e1cf27dfa51c590337d695d32f8d4f1297c

    • SHA256

      246add13dc493aecc7751ca42ee0cda88c0c4bc0261c1be5b62f17d31d7c1b33

    • SHA512

      6f17a9436e9e7b5987f6772ae0e429239cba402121c46b402cf8c163cd37b019f5e4a166fbd205690dc7d7832dbfe5d4af1a8226a1236ad90601400a379f8d50

    • SSDEEP

      24576:FBfuZfeq6sNO6hTdtTF+TxMoxQH1Tj4wtjYZH1DmoYYzi3WH45yv+OueSJhm9e:F7qFfJtTF+TxMoxc1TU+j+dAzGwlrh

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks