General

  • Target

    b94c4833f7ebfbc2706299aaf9fbaf3dd1f770f566f01a37f6d1644e1ef9c7ae

  • Size

    2.5MB

  • Sample

    240608-bnpgsseh91

  • MD5

    ee3429aff68aa30e9093408d18b63cf2

  • SHA1

    717db718d1e67a14cae069e773fcf070a13d194c

  • SHA256

    b94c4833f7ebfbc2706299aaf9fbaf3dd1f770f566f01a37f6d1644e1ef9c7ae

  • SHA512

    888448540583460bfa62615558383b048d9e282300be0661b1b5ed735098a429af8af5af41368a336de622ba5311ae3f86d89b5f6d9d269ec786c04794d08f02

  • SSDEEP

    49152:Zcm4081qpZBUbHEmJFsEAQACR07Q3byRD8aXY658:ZcmmqvBUbHtXfAw07QLyLn

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

C2

https://t.me/r8z0l

https://steamcommunity.com/profiles/76561199698764354

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0

Targets

    • Target

      b94c4833f7ebfbc2706299aaf9fbaf3dd1f770f566f01a37f6d1644e1ef9c7ae

    • Size

      2.5MB

    • MD5

      ee3429aff68aa30e9093408d18b63cf2

    • SHA1

      717db718d1e67a14cae069e773fcf070a13d194c

    • SHA256

      b94c4833f7ebfbc2706299aaf9fbaf3dd1f770f566f01a37f6d1644e1ef9c7ae

    • SHA512

      888448540583460bfa62615558383b048d9e282300be0661b1b5ed735098a429af8af5af41368a336de622ba5311ae3f86d89b5f6d9d269ec786c04794d08f02

    • SSDEEP

      49152:Zcm4081qpZBUbHEmJFsEAQACR07Q3byRD8aXY658:ZcmmqvBUbHtXfAw07QLyLn

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks