General

  • Target

    1f7153ff895f18fa3b381938771aeaf0489873390aded699ff3a1befd5350c0d

  • Size

    2.4MB

  • Sample

    240608-p6tq5acg24

  • MD5

    a8924a8d6996c447a87bb1720f43f80c

  • SHA1

    02dfd4f4b976138a48e7fa6a295141d258bd7968

  • SHA256

    1f7153ff895f18fa3b381938771aeaf0489873390aded699ff3a1befd5350c0d

  • SHA512

    df58dc6d28291bd1e29cc6237afe630ba282540f4fe0d2dfa544a57b15426442c1b964558a66345bdd678bc401cb37085ef8fd897e73bffd4e98b7e94f5b78a7

  • SSDEEP

    49152:Q4bMNga4CY6SZIxiKVD4ttcgrh1+m6ESUtF3XRs:QGMNF4CpAsi+Ktcgt1+mSUtFH

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      1f7153ff895f18fa3b381938771aeaf0489873390aded699ff3a1befd5350c0d

    • Size

      2.4MB

    • MD5

      a8924a8d6996c447a87bb1720f43f80c

    • SHA1

      02dfd4f4b976138a48e7fa6a295141d258bd7968

    • SHA256

      1f7153ff895f18fa3b381938771aeaf0489873390aded699ff3a1befd5350c0d

    • SHA512

      df58dc6d28291bd1e29cc6237afe630ba282540f4fe0d2dfa544a57b15426442c1b964558a66345bdd678bc401cb37085ef8fd897e73bffd4e98b7e94f5b78a7

    • SSDEEP

      49152:Q4bMNga4CY6SZIxiKVD4ttcgrh1+m6ESUtF3XRs:QGMNF4CpAsi+Ktcgt1+mSUtFH

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks