General

  • Target

    0e28a5946a07a383712983752bc271ed.bin

  • Size

    6.3MB

  • Sample

    240616-bc8rassemg

  • MD5

    b78d67cc3d5045eabe3fdab5f97c86ec

  • SHA1

    b1ea79aeaa3a7ba5286cc8022540456ffe9895b5

  • SHA256

    41371734b1408e6c91a150361533c3a653268050c14e5c8f312edd980f5bb0d8

  • SHA512

    e8e4749353ec55c4c642c1b60fcf5fcb926f108837624f6c172c843d3613d804b7e1effae0057b2e2a06429e4417c42ac89046a00b0c8dd1b70ca5ca4f50471c

  • SSDEEP

    196608:3ztygguQz3bilBcSfnlYlNsRYsTyLBpXP:JygguHBueRXeL/P

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      Setup.exe

    • Size

      670.0MB

    • MD5

      87a968fd102e53e6ac4f678213405b56

    • SHA1

      057a94d37389e111bf384306d64186c18e9e090d

    • SHA256

      df0927eb284b3604c55cbf9ef4b0b2420a5618c555529b6bbda043266732e557

    • SHA512

      4036f7719132e68332e3bf6f81dce3c8643e3c83dd8503cdd5897a1fdac36a8d338db7b45e244533687fc982f440d421bafad1d9f1120158df04d65d6f8da3fe

    • SSDEEP

      98304:YZL8H6pQ7tD26q13x85KW+y07jEBiacFRutfxgBAXK34iFGCXEd+JebL4MtnaTn:Yy2QpD2VoKW+FjeiBFRo0AXulMxor

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Process Discovery

1
T1057

Collection

Data from Local System

1
T1005

Tasks