General

  • Target

    50cbd78435a795ee39ed9fc11dec9339d4b0eac9977869496e62fbf5fbfa4956.exe

  • Size

    2.4MB

  • Sample

    240524-knrrlabe8w

  • MD5

    b57e4e7ee0a7c56509e40f16ab4fc371

  • SHA1

    ee299980df008dc151b87a935958e58adcfccadf

  • SHA256

    50cbd78435a795ee39ed9fc11dec9339d4b0eac9977869496e62fbf5fbfa4956

  • SHA512

    b3f7c4959871846f4eca8ceac5a108969c5458f87f65299a590ad531f42de8d9d57a37354c0ec5fa0b06f380a1fd43bb04d677a9ada671e24086d9110403d689

  • SSDEEP

    49152:jxIRJF1HL+VdX68kUKJtTF+TxMoxc1TU+j+dAzGwlrh:jEJF16dX68dKtIuoITsdZ

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

C2

https://steamcommunity.com/profiles/76561199689717899

https://t.me/copterwin

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0

Targets

    • Target

      50cbd78435a795ee39ed9fc11dec9339d4b0eac9977869496e62fbf5fbfa4956.exe

    • Size

      2.4MB

    • MD5

      b57e4e7ee0a7c56509e40f16ab4fc371

    • SHA1

      ee299980df008dc151b87a935958e58adcfccadf

    • SHA256

      50cbd78435a795ee39ed9fc11dec9339d4b0eac9977869496e62fbf5fbfa4956

    • SHA512

      b3f7c4959871846f4eca8ceac5a108969c5458f87f65299a590ad531f42de8d9d57a37354c0ec5fa0b06f380a1fd43bb04d677a9ada671e24086d9110403d689

    • SSDEEP

      49152:jxIRJF1HL+VdX68kUKJtTF+TxMoxc1TU+j+dAzGwlrh:jEJF16dX68dKtIuoITsdZ

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks