General

  • Target

    14d474d626b7cbe4dd1803c6064e1096b256ec179555fdf5d78927fcb1e60dc8

  • Size

    2.0MB

  • Sample

    240526-vah8eadh44

  • MD5

    70e4e58e6d81ba8b25d9d8b5890b4980

  • SHA1

    05fb778752195ab2b679fefc9142ee5d945e1b45

  • SHA256

    14d474d626b7cbe4dd1803c6064e1096b256ec179555fdf5d78927fcb1e60dc8

  • SHA512

    985b03802e56f46a57e0f187beaac950f5ddfe19b48c900b9626df51c624e3ae9f28047aa4056d20e782ed381146afde5c70a871303eb52f9e709718ff31e8c5

  • SSDEEP

    49152:s4K3x1vUSJtTF+TxMoxc1TU+j+dAzGwlrh:s4Ex18StIuoITsdZ

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

C2

https://steamcommunity.com/profiles/76561199689717899

https://t.me/copterwin

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0

Targets

    • Target

      14d474d626b7cbe4dd1803c6064e1096b256ec179555fdf5d78927fcb1e60dc8

    • Size

      2.0MB

    • MD5

      70e4e58e6d81ba8b25d9d8b5890b4980

    • SHA1

      05fb778752195ab2b679fefc9142ee5d945e1b45

    • SHA256

      14d474d626b7cbe4dd1803c6064e1096b256ec179555fdf5d78927fcb1e60dc8

    • SHA512

      985b03802e56f46a57e0f187beaac950f5ddfe19b48c900b9626df51c624e3ae9f28047aa4056d20e782ed381146afde5c70a871303eb52f9e709718ff31e8c5

    • SSDEEP

      49152:s4K3x1vUSJtTF+TxMoxc1TU+j+dAzGwlrh:s4Ex18StIuoITsdZ

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks