General

  • Target

    5aa0fe3444d07d33c0555b69af1e7345e62c0b4af5e49d26c7953cc1733ec5a4

  • Size

    1.7MB

  • Sample

    240610-sbtpes1cjn

  • MD5

    51e1cff957c94fa783c34ae86339a31d

  • SHA1

    4788287592fb033308d9af809a7b46e6382b8be7

  • SHA256

    5aa0fe3444d07d33c0555b69af1e7345e62c0b4af5e49d26c7953cc1733ec5a4

  • SHA512

    f877a8514f262304264e06393b0d8e02934beaf1ab3f8ef86542e56671027d6984d2f7cdfb26669a793ad9fca4c7b059538a6031b3fefcfc135c6faec9d8212c

  • SSDEEP

    24576:JoZYQkmdrf+cUfMxVVtes12FxwojKr98YGeGG9iH:JPYxxUkxVVChjHZQsH

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

C2

https://t.me/r8z0l

https://steamcommunity.com/profiles/76561199698764354

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0

Targets

    • Target

      5aa0fe3444d07d33c0555b69af1e7345e62c0b4af5e49d26c7953cc1733ec5a4

    • Size

      1.7MB

    • MD5

      51e1cff957c94fa783c34ae86339a31d

    • SHA1

      4788287592fb033308d9af809a7b46e6382b8be7

    • SHA256

      5aa0fe3444d07d33c0555b69af1e7345e62c0b4af5e49d26c7953cc1733ec5a4

    • SHA512

      f877a8514f262304264e06393b0d8e02934beaf1ab3f8ef86542e56671027d6984d2f7cdfb26669a793ad9fca4c7b059538a6031b3fefcfc135c6faec9d8212c

    • SSDEEP

      24576:JoZYQkmdrf+cUfMxVVtes12FxwojKr98YGeGG9iH:JPYxxUkxVVChjHZQsH

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks