General

  • Target

    42526763833c450c4ee261420e97af3a4876468f04aa4de53c8d1dda7338ec2e

  • Size

    1.8MB

  • Sample

    240523-k7yz1sbf8x

  • MD5

    9625b09df886dc1ae4bdde144223b622

  • SHA1

    3dcf84351240c8f5771fb3e3f576a32da918a6a3

  • SHA256

    42526763833c450c4ee261420e97af3a4876468f04aa4de53c8d1dda7338ec2e

  • SHA512

    ade9715da4a01936a11765d781d689ec17900dedade3e1cd98729f56d74943cc19c2668928e3ff64e6f1d573fcdd96e51341bcdb5f08e546b892be11fc906c6e

  • SSDEEP

    24576:FBfuZfeq6shO6hTdtTF+TxMoxQH1Tj4wtjYZH1DmoYYzi3WH45yv+OueSJhm9e:F7qFrJtTF+TxMoxc1TU+j+dAzGwlrh

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      42526763833c450c4ee261420e97af3a4876468f04aa4de53c8d1dda7338ec2e

    • Size

      1.8MB

    • MD5

      9625b09df886dc1ae4bdde144223b622

    • SHA1

      3dcf84351240c8f5771fb3e3f576a32da918a6a3

    • SHA256

      42526763833c450c4ee261420e97af3a4876468f04aa4de53c8d1dda7338ec2e

    • SHA512

      ade9715da4a01936a11765d781d689ec17900dedade3e1cd98729f56d74943cc19c2668928e3ff64e6f1d573fcdd96e51341bcdb5f08e546b892be11fc906c6e

    • SSDEEP

      24576:FBfuZfeq6shO6hTdtTF+TxMoxQH1Tj4wtjYZH1DmoYYzi3WH45yv+OueSJhm9e:F7qFrJtTF+TxMoxc1TU+j+dAzGwlrh

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks