General

  • Target

    c20c7132043488b5b58394c3a8b65060_NeikiAnalytics.exe

  • Size

    1.9MB

  • Sample

    240615-3bwtwsshjn

  • MD5

    c20c7132043488b5b58394c3a8b65060

  • SHA1

    342ea0777384c14dc201df2fbc9274b7db3de9df

  • SHA256

    78297499183ade5301017f837baff3e0c4a5e6562c3918ea532caa23d3847944

  • SHA512

    cdf362b9be57a7f4d938c46024c8ce4cc6590203971e3278417d515d2f9873fccfdccdbdb7157f2dc4f3bffb700266edf7309dac16f69b1891441aab21223e0a

  • SSDEEP

    49152:zsC/lYEBYLsEAQACR07Q3byRD8aXY658:zsCdYEByfAw07QLyLn

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

C2

https://t.me/r8z0l

https://steamcommunity.com/profiles/76561199698764354

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0

Targets

    • Target

      c20c7132043488b5b58394c3a8b65060_NeikiAnalytics.exe

    • Size

      1.9MB

    • MD5

      c20c7132043488b5b58394c3a8b65060

    • SHA1

      342ea0777384c14dc201df2fbc9274b7db3de9df

    • SHA256

      78297499183ade5301017f837baff3e0c4a5e6562c3918ea532caa23d3847944

    • SHA512

      cdf362b9be57a7f4d938c46024c8ce4cc6590203971e3278417d515d2f9873fccfdccdbdb7157f2dc4f3bffb700266edf7309dac16f69b1891441aab21223e0a

    • SSDEEP

      49152:zsC/lYEBYLsEAQACR07Q3byRD8aXY658:zsCdYEByfAw07QLyLn

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks