General

  • Target

    52e7510e97f558788067937c97a268ad4951d22f8b94d87855bcb3dd4d6e6708.exe

  • Size

    13.0MB

  • Sample

    240617-bhncjsxbqh

  • MD5

    543e80dbd2fa8ddf8cebccc1099b4609

  • SHA1

    dae57bb7f0ef4e045e0da446ac8e8f546e341147

  • SHA256

    52e7510e97f558788067937c97a268ad4951d22f8b94d87855bcb3dd4d6e6708

  • SHA512

    b2215db059c9c1b437eb229645e5411199c822d1c1458e240c9edef3c469d5b49a70f3bda1b9b017f9a0373702fb4c99388ecd0942958e17be587cc07ebde33b

  • SSDEEP

    98304:+T+qSAWrRPEfY6D+4fZoh6hOVwZMNriErlBOogs3q/vWhrCVTKs:+T+qSAW9PuTpfPwxMteU

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      52e7510e97f558788067937c97a268ad4951d22f8b94d87855bcb3dd4d6e6708.exe

    • Size

      13.0MB

    • MD5

      543e80dbd2fa8ddf8cebccc1099b4609

    • SHA1

      dae57bb7f0ef4e045e0da446ac8e8f546e341147

    • SHA256

      52e7510e97f558788067937c97a268ad4951d22f8b94d87855bcb3dd4d6e6708

    • SHA512

      b2215db059c9c1b437eb229645e5411199c822d1c1458e240c9edef3c469d5b49a70f3bda1b9b017f9a0373702fb4c99388ecd0942958e17be587cc07ebde33b

    • SSDEEP

      98304:+T+qSAWrRPEfY6D+4fZoh6hOVwZMNriErlBOogs3q/vWhrCVTKs:+T+qSAW9PuTpfPwxMteU

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Detects Windows executables referencing non-Windows User-Agents

    • Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion

    • Detects executables containing potential Windows Defender anti-emulation checks

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Process Discovery

1
T1057

Collection

Data from Local System

1
T1005

Tasks