General

  • Target

    cfe03f6d36030a243ce5fd8d4807179c330643bb556fa68d60525e66b12ed713

  • Size

    2.0MB

  • Sample

    240526-xt65pahe36

  • MD5

    9a7c6b2c11671134d9119d386fe44ebd

  • SHA1

    325a1c6a48328db624224762053d75cd0956b606

  • SHA256

    cfe03f6d36030a243ce5fd8d4807179c330643bb556fa68d60525e66b12ed713

  • SHA512

    13552920c99a87e7309109538fbe921071535f3fb51027f9a0b2fe1bae158b68fbdbc165e3a5d8ef5e1ebd58b673c77d60d52dd39966b95ded3537fd03308b46

  • SSDEEP

    49152:OePpQExJtTF+TxMoxc1TU+j+dAzGwlrh:OePpQExtIuoITsdZ

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

C2

https://steamcommunity.com/profiles/76561199689717899

https://t.me/copterwin

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0

Targets

    • Target

      cfe03f6d36030a243ce5fd8d4807179c330643bb556fa68d60525e66b12ed713

    • Size

      2.0MB

    • MD5

      9a7c6b2c11671134d9119d386fe44ebd

    • SHA1

      325a1c6a48328db624224762053d75cd0956b606

    • SHA256

      cfe03f6d36030a243ce5fd8d4807179c330643bb556fa68d60525e66b12ed713

    • SHA512

      13552920c99a87e7309109538fbe921071535f3fb51027f9a0b2fe1bae158b68fbdbc165e3a5d8ef5e1ebd58b673c77d60d52dd39966b95ded3537fd03308b46

    • SSDEEP

      49152:OePpQExJtTF+TxMoxc1TU+j+dAzGwlrh:OePpQExtIuoITsdZ

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks