General

  • Target

    703926d5eee43c9975b61c646e69aa56b7075bdc8eb76df2aa2c5dac4edc9ad1

  • Size

    2.0MB

  • Sample

    240526-prjydadf78

  • MD5

    1475271572865faafd00e5ac389e46c3

  • SHA1

    87314af6cdbba97c1674008ff98df3c8e610cc5b

  • SHA256

    703926d5eee43c9975b61c646e69aa56b7075bdc8eb76df2aa2c5dac4edc9ad1

  • SHA512

    4e8ff79c15117d670a637203c1af257418edddea98497db87e04f86fda10e92f155f7d0a582797bb598892b7f424b1b24c3ed10a19a12b2241ed9b6d13868b3c

  • SSDEEP

    49152:OePpQExJtTF+TxMoxc1TU+j+dAzGwlrh:OePpQExtIuoITsdZ

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

C2

https://steamcommunity.com/profiles/76561199689717899

https://t.me/copterwin

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0

Targets

    • Target

      703926d5eee43c9975b61c646e69aa56b7075bdc8eb76df2aa2c5dac4edc9ad1

    • Size

      2.0MB

    • MD5

      1475271572865faafd00e5ac389e46c3

    • SHA1

      87314af6cdbba97c1674008ff98df3c8e610cc5b

    • SHA256

      703926d5eee43c9975b61c646e69aa56b7075bdc8eb76df2aa2c5dac4edc9ad1

    • SHA512

      4e8ff79c15117d670a637203c1af257418edddea98497db87e04f86fda10e92f155f7d0a582797bb598892b7f424b1b24c3ed10a19a12b2241ed9b6d13868b3c

    • SSDEEP

      49152:OePpQExJtTF+TxMoxc1TU+j+dAzGwlrh:OePpQExtIuoITsdZ

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks