General

  • Target

    dae1412cddc24c46fb6fa756fed01269f6fb9608bb1b5e4ba342918b7d1aacd6

  • Size

    4.6MB

  • Sample

    240614-re3k3axenl

  • MD5

    231b1095eedb4fa88b968859ab34261e

  • SHA1

    487d0bc2b0be3be0874c27b3f3fe293fb421f017

  • SHA256

    dae1412cddc24c46fb6fa756fed01269f6fb9608bb1b5e4ba342918b7d1aacd6

  • SHA512

    b7d7d8e4fe684c2e2ec0e934de33709c431addca3f984890145d19706a89e8ac74dd5885ac74dbf5000eba611a01c51544a54434becbe39eaf33f48057ddb7c9

  • SSDEEP

    98304:2h57HU1Wvf6kIeW+t46xmlZ38c3T9fRe7e4mVoPP:2hJHU1WvEv+t5xaZMKfRchm

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

C2

https://t.me/memve4erin

https://steamcommunity.com/profiles/76561199699680841

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0

Targets

    • Target

      dae1412cddc24c46fb6fa756fed01269f6fb9608bb1b5e4ba342918b7d1aacd6

    • Size

      4.6MB

    • MD5

      231b1095eedb4fa88b968859ab34261e

    • SHA1

      487d0bc2b0be3be0874c27b3f3fe293fb421f017

    • SHA256

      dae1412cddc24c46fb6fa756fed01269f6fb9608bb1b5e4ba342918b7d1aacd6

    • SHA512

      b7d7d8e4fe684c2e2ec0e934de33709c431addca3f984890145d19706a89e8ac74dd5885ac74dbf5000eba611a01c51544a54434becbe39eaf33f48057ddb7c9

    • SSDEEP

      98304:2h57HU1Wvf6kIeW+t46xmlZ38c3T9fRe7e4mVoPP:2hJHU1WvEv+t5xaZMKfRchm

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks