General

  • Target

    abaefa482e3cd3b2a498a83530a0418e32078e81d975c69b13dfd8dd12213b5a

  • Size

    2.0MB

  • Sample

    240524-ffwcladh99

  • MD5

    d92c985ddae73d2e1407ca76e682f2fa

  • SHA1

    8a04a22fc7d7536675af4ae5cdfbba12612751d0

  • SHA256

    abaefa482e3cd3b2a498a83530a0418e32078e81d975c69b13dfd8dd12213b5a

  • SHA512

    9e83c8e1b5cf7e3ac2d6fb342923f17d15ca6677301ae8ea5fe8a4201a68b37951bc17befc4e06b3fbfa376204b3c1c2d8ddcd2a07173a9bf47971aea0cc7992

  • SSDEEP

    49152:IFno/jfQJtTF+TxMoxc1TU+j+dAzGkiT:IFno/jotIuoITsdZT

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

C2

https://steamcommunity.com/profiles/76561199686524322

https://t.me/k0mono

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15 Ddg/17.4.1

Targets

    • Target

      abaefa482e3cd3b2a498a83530a0418e32078e81d975c69b13dfd8dd12213b5a

    • Size

      2.0MB

    • MD5

      d92c985ddae73d2e1407ca76e682f2fa

    • SHA1

      8a04a22fc7d7536675af4ae5cdfbba12612751d0

    • SHA256

      abaefa482e3cd3b2a498a83530a0418e32078e81d975c69b13dfd8dd12213b5a

    • SHA512

      9e83c8e1b5cf7e3ac2d6fb342923f17d15ca6677301ae8ea5fe8a4201a68b37951bc17befc4e06b3fbfa376204b3c1c2d8ddcd2a07173a9bf47971aea0cc7992

    • SSDEEP

      49152:IFno/jfQJtTF+TxMoxc1TU+j+dAzGkiT:IFno/jotIuoITsdZT

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks