General

  • Target

    @^NewFile_PCSetup_77665_ṔḁṨṨẄṏṛḒ_^$.zip

  • Size

    8.0MB

  • Sample

    240616-v5yxcavaqn

  • MD5

    b6abd24f1488d6e9f9bdc6375f1a7ba9

  • SHA1

    f59a652de28270e53e147fce2fbe8865a391d995

  • SHA256

    a2b34479327477c185736f3d540ab29f6a4d1b9f3b66109e4e706760daec5b61

  • SHA512

    00b309dc034760963548073b203a54900e216adf97c7eaf47caca697a9d97bebc84fcee8c34f0ab1de2747ec7a444b9767cbc402b59514a8514f79f7b25df1b1

  • SSDEEP

    196608:DSMeeQNfc7a24+hj2in9DqwqN81oTKRgrO//p:jkJu1z9ewqNoCKyqJ

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      @^NewFile_PCSetup_77665_????????_^$/Setup.exe

    • Size

      670.0MB

    • MD5

      87a968fd102e53e6ac4f678213405b56

    • SHA1

      057a94d37389e111bf384306d64186c18e9e090d

    • SHA256

      df0927eb284b3604c55cbf9ef4b0b2420a5618c555529b6bbda043266732e557

    • SHA512

      4036f7719132e68332e3bf6f81dce3c8643e3c83dd8503cdd5897a1fdac36a8d338db7b45e244533687fc982f440d421bafad1d9f1120158df04d65d6f8da3fe

    • SSDEEP

      98304:YZL8H6pQ7tD26q13x85KW+y07jEBiacFRutfxgBAXK34iFGCXEd+JebL4MtnaTn:Yy2QpD2VoKW+FjeiBFRo0AXulMxor

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

4
T1552

Credentials In Files

4
T1552.001

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Process Discovery

1
T1057

Collection

Data from Local System

4
T1005

Tasks