General

  • Target

    ##!!SetUp_2244_Pa$sW0rd$$!!.zip

  • Size

    8.9MB

  • Sample

    240615-lwb7jswdqf

  • MD5

    8d1ec93eeb533c172b6dd61464dfd14a

  • SHA1

    19e455025b4cee80f95a0cd87dec8317980c99ca

  • SHA256

    4598c5238bd0334b7b237e768de7e703fdcccf553062201fbe1f1addc3bfa821

  • SHA512

    763333196cda6b0fe828920a9087aa0eb06fb92084353cdf34172a423cd9e1851ff4227f372ff634a2a40d0ed2c12c03f23198b1a312d5c6f4549b4c9eebefc6

  • SSDEEP

    196608:vZ8I222mFGZPRZxMc4dtIFc87F79UrvBB1xtYA//H:vZT2LmFGZPRZmcQtf8upBNJn

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      ##!!SetUp_2244_Pa$sW0rd$$!!/Setup.exe

    • Size

      94KB

    • MD5

      9a4cc0d8e7007f7ef20ca585324e0739

    • SHA1

      f3e5a2e477cac4bab85940a2158eed78f2d74441

    • SHA256

      040d121a3179f49cd3f33f4bc998bc8f78b7f560bfd93f279224d69e76a06e92

    • SHA512

      54636a48141804112f5b4f2fc70cb7c959a041e5743aeedb5184091b51daa1d1a03f0016e8299c0d56d924c6c8ae585e4fc864021081ffdf1e6f3eab11dd43b3

    • SSDEEP

      1536:9M/AhIxHHWMpdPa5wiE21M8kJIGFvb1Cwn/ZDs5yf:9M4SwMpdCq/IM8uIGfV/ZDso

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks