General

  • Target

    e3c5968784e907b6a27e9f718cee1d029b54ce14589c24a2823708e637c66ed7

  • Size

    2.6MB

  • Sample

    240529-akg3wabd35

  • MD5

    297373bb8219103b56f00efb6cfd7352

  • SHA1

    148e86a4e35abd49e027ccffb98e5ce8229dbbb0

  • SHA256

    e3c5968784e907b6a27e9f718cee1d029b54ce14589c24a2823708e637c66ed7

  • SHA512

    d4160b37b4060a3772925ed7d9f57fc916276f35345e424178bb0062a96c59153567a645f690b3e798e2f292383026b2e49eb807fa7a0dd97859c6ac4d4bf460

  • SSDEEP

    49152:XQzIzMiqCNw7JtTF+TxMoxc1TU+j+dAzGwlrh:XY598ytIuoITsdZ

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

C2

https://steamcommunity.com/profiles/76561199689717899

https://t.me/copterwin

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0

Targets

    • Target

      e3c5968784e907b6a27e9f718cee1d029b54ce14589c24a2823708e637c66ed7

    • Size

      2.6MB

    • MD5

      297373bb8219103b56f00efb6cfd7352

    • SHA1

      148e86a4e35abd49e027ccffb98e5ce8229dbbb0

    • SHA256

      e3c5968784e907b6a27e9f718cee1d029b54ce14589c24a2823708e637c66ed7

    • SHA512

      d4160b37b4060a3772925ed7d9f57fc916276f35345e424178bb0062a96c59153567a645f690b3e798e2f292383026b2e49eb807fa7a0dd97859c6ac4d4bf460

    • SSDEEP

      49152:XQzIzMiqCNw7JtTF+TxMoxc1TU+j+dAzGwlrh:XY598ytIuoITsdZ

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks