General

  • Target

    b1f67e16ef67b958f74b96d940ea6216dd800dfbf4afbff79e4c8ce313473212

  • Size

    1.8MB

  • Sample

    240523-kyqbhsbd8w

  • MD5

    9dd1ebec74f8fa3cca2167f2cedf4afc

  • SHA1

    412b3aee147e78eda48f9fbf089d3341eef3a5e1

  • SHA256

    b1f67e16ef67b958f74b96d940ea6216dd800dfbf4afbff79e4c8ce313473212

  • SHA512

    eb30e4a013337e3d40195d578de9bec8718ad02a2231a7f1401d06fc9ce77b8f615433ecdb6b3712ebd3b4773e4282d6948e3f22dd4c053e24be64fb56e8e3d5

  • SSDEEP

    24576:FBfuZfeq6s5O6hTdtTF+TxMoxQH1Tj4wtjYZH1DmoYYzi3WH45yv+OueSJhm9e:F7qFjJtTF+TxMoxc1TU+j+dAzGwlrh

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      b1f67e16ef67b958f74b96d940ea6216dd800dfbf4afbff79e4c8ce313473212

    • Size

      1.8MB

    • MD5

      9dd1ebec74f8fa3cca2167f2cedf4afc

    • SHA1

      412b3aee147e78eda48f9fbf089d3341eef3a5e1

    • SHA256

      b1f67e16ef67b958f74b96d940ea6216dd800dfbf4afbff79e4c8ce313473212

    • SHA512

      eb30e4a013337e3d40195d578de9bec8718ad02a2231a7f1401d06fc9ce77b8f615433ecdb6b3712ebd3b4773e4282d6948e3f22dd4c053e24be64fb56e8e3d5

    • SSDEEP

      24576:FBfuZfeq6s5O6hTdtTF+TxMoxQH1Tj4wtjYZH1DmoYYzi3WH45yv+OueSJhm9e:F7qFjJtTF+TxMoxc1TU+j+dAzGwlrh

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks