General

  • Target

    8cb0934a7afa08a4f14e08903fd794c3a53b8e9c56732b513b590227d58c9338

  • Size

    1.8MB

  • Sample

    240523-jt1q1sab33

  • MD5

    e0d145ddcd92b156de696a2102a37648

  • SHA1

    637f0689f43e0567929d4eab810df79601b18c4c

  • SHA256

    8cb0934a7afa08a4f14e08903fd794c3a53b8e9c56732b513b590227d58c9338

  • SHA512

    9f6fd8cb346bccbaee340ce5114f8fb3bd00c30a56f8acffcc6c024fd23c49984066991402a7c89dbafbc19f92c0e017f12f9eb8bdda64361db128a9a4ee59f4

  • SSDEEP

    24576:FBfuZfeq6sxO6hTdtTF+TxMoxQH1Tj4wtjYZH1DmoYYzi3WH45yv+OueSJhm9e:F7qFbJtTF+TxMoxc1TU+j+dAzGwlrh

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      8cb0934a7afa08a4f14e08903fd794c3a53b8e9c56732b513b590227d58c9338

    • Size

      1.8MB

    • MD5

      e0d145ddcd92b156de696a2102a37648

    • SHA1

      637f0689f43e0567929d4eab810df79601b18c4c

    • SHA256

      8cb0934a7afa08a4f14e08903fd794c3a53b8e9c56732b513b590227d58c9338

    • SHA512

      9f6fd8cb346bccbaee340ce5114f8fb3bd00c30a56f8acffcc6c024fd23c49984066991402a7c89dbafbc19f92c0e017f12f9eb8bdda64361db128a9a4ee59f4

    • SSDEEP

      24576:FBfuZfeq6sxO6hTdtTF+TxMoxQH1Tj4wtjYZH1DmoYYzi3WH45yv+OueSJhm9e:F7qFbJtTF+TxMoxc1TU+j+dAzGwlrh

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks