General

  • Target

    file.exe

  • Size

    396KB

  • Sample

    240528-wxk6yseg6t

  • MD5

    16201cd3113173607e5b7e20294803fe

  • SHA1

    d2c248e987608e80c78c117a59640635d56857f9

  • SHA256

    e7eeb69e2aa5a205d9035b52efb9e64fef7484e2cc742d8ec8dbe396b86e50a4

  • SHA512

    02813f8b8dc63cc704ec109379238d76f6c0b977ce03aac1f614531d4fdf2fd0c52f79ebeaa4c3b1b39b5b5b3aee6803c4b1eefb2a6c107b9a79de9a42449e08

  • SSDEEP

    6144:j6Zp//sCQTfamA1AxyoXG7tKsK0p5zd6ayxiETiZBnIzicdNsxya5zZcCaPI:j6UCQTfaTuls56ay9TYGa3cNI

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

C2

https://steamcommunity.com/profiles/76561199689717899

https://t.me/copterwin

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0

Targets

    • Target

      file.exe

    • Size

      396KB

    • MD5

      16201cd3113173607e5b7e20294803fe

    • SHA1

      d2c248e987608e80c78c117a59640635d56857f9

    • SHA256

      e7eeb69e2aa5a205d9035b52efb9e64fef7484e2cc742d8ec8dbe396b86e50a4

    • SHA512

      02813f8b8dc63cc704ec109379238d76f6c0b977ce03aac1f614531d4fdf2fd0c52f79ebeaa4c3b1b39b5b5b3aee6803c4b1eefb2a6c107b9a79de9a42449e08

    • SSDEEP

      6144:j6Zp//sCQTfamA1AxyoXG7tKsK0p5zd6ayxiETiZBnIzicdNsxya5zZcCaPI:j6UCQTfaTuls56ay9TYGa3cNI

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks