General

  • Target

    053e2d163701b05e0a365740b3acc67e.bin

  • Size

    2.6MB

  • Sample

    240615-bdmv8axcpm

  • MD5

    c8dfb9029988bc5f5d1682f3640817fa

  • SHA1

    6e1a8c40afd09161aeb6264f49ab40abb3b69f51

  • SHA256

    b512b0c4c6ef548033fbce2a8261e7e15796be715c5fdd57aa8ef6a67dd1a50d

  • SHA512

    619eac9456edcbf4bd8dacd61ce2b0dcff41489d22b53fc9504bf30911d8e3b1570664d4e73cc522d59f0af1a1a43f0931145d36a90c227c8d4aa798b8a5a5f2

  • SSDEEP

    49152:3iZTMjH22ApivM7NNGKaGG+eF5sPiaSff5g94VDHq6ZlmUk2q+LP8LbWHowYTGlf:MTMy2SikxNGKaCeF5sa1ffuulmgq+roS

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

C2

https://t.me/memve4erin

https://steamcommunity.com/profiles/76561199699680841

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0

Targets

    • Target

      2289656d0b1515397a4b1a827382987140dd7c0f0305be61ae2e22b2a882b392.exe

    • Size

      4.5MB

    • MD5

      053e2d163701b05e0a365740b3acc67e

    • SHA1

      aaf04301f284fb9a47a5e570cd830cfc2092f799

    • SHA256

      2289656d0b1515397a4b1a827382987140dd7c0f0305be61ae2e22b2a882b392

    • SHA512

      5fa197687df2084c6498fcfb7cccea98c8a195f3182889773d9fd6bcded33cd3d72ac72f62bbb40769bc9aa27f5625217258c4b98329caa45e26cfcad7331f2b

    • SSDEEP

      98304:+qJcqsmdaTXUbGOJqd9tZ/qPLmpuREHrwRnC/eqJ/o:feqddazUbGPJiPLkqEHgyJ/

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks