General

  • Target

    4988-7-0x0000000000400000-0x000000000089E000-memory.dmp

  • Size

    4.6MB

  • Sample

    240524-xfavbsfb4z

  • MD5

    e8437864b54acb8e17840bf61270b4f7

  • SHA1

    debe61afd4402bba88b96918f672362b2a86a94c

  • SHA256

    5379186657028e1bcd7e0be1507e0ef14109d7973dfe80e016cf47192d910912

  • SHA512

    811b5eeb06ec551aa0d3dfb4eb7f1a72e088a8b2af10a9f7ddded30cb0fd1b97ecf9a089e99860ef4c0a7ed6eed2e42d788f5a6be1ff59c61b0dc164faead61c

  • SSDEEP

    49152:2g/0pQi1b4bSbHByQWa35nOvI2+t+RmJRt/xdtjRRB:2g/0d1UbX/Iwmd

Score
10/10

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

C2

https://steamcommunity.com/profiles/76561199689717899

https://t.me/copterwin

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0

Targets

    • Target

      4988-7-0x0000000000400000-0x000000000089E000-memory.dmp

    • Size

      4.6MB

    • MD5

      e8437864b54acb8e17840bf61270b4f7

    • SHA1

      debe61afd4402bba88b96918f672362b2a86a94c

    • SHA256

      5379186657028e1bcd7e0be1507e0ef14109d7973dfe80e016cf47192d910912

    • SHA512

      811b5eeb06ec551aa0d3dfb4eb7f1a72e088a8b2af10a9f7ddded30cb0fd1b97ecf9a089e99860ef4c0a7ed6eed2e42d788f5a6be1ff59c61b0dc164faead61c

    • SSDEEP

      49152:2g/0pQi1b4bSbHByQWa35nOvI2+t+RmJRt/xdtjRRB:2g/0d1UbX/Iwmd

    Score
    3/10

MITRE ATT&CK Matrix

Tasks