General

  • Target

    e185b5ac05bf0947b5fd19b8f0892afa4fcbbceba5fc76ad52ae3fdef2045829

  • Size

    4.2MB

  • Sample

    240617-fvryqazelj

  • MD5

    8cfe70cf4f35c7f9b4ddba327d44c1f8

  • SHA1

    4fd044d2fee22138668153a7472b34e0b9a99c06

  • SHA256

    e185b5ac05bf0947b5fd19b8f0892afa4fcbbceba5fc76ad52ae3fdef2045829

  • SHA512

    aec1486ae4e64e8ca59baaf7a623fc4c6b56a3b3bcb6e46cadf82350799edfc62ede7bdb54fcbce490c5506e39f1dc778be160c130edcb6784667a448dafc811

  • SSDEEP

    49152:Yg0GkQNDv4gz+LzRdo/msRu92zAPZHPPumf7BQOyCEJ7eAPDbn5m0IcQgZV0Cego:yLNdo/TRuMyfPyCk7eIZIcQ0Ogo

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

C2

https://t.me/memve4erin

https://steamcommunity.com/profiles/76561199699680841

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0

Targets

    • Target

      e185b5ac05bf0947b5fd19b8f0892afa4fcbbceba5fc76ad52ae3fdef2045829

    • Size

      4.2MB

    • MD5

      8cfe70cf4f35c7f9b4ddba327d44c1f8

    • SHA1

      4fd044d2fee22138668153a7472b34e0b9a99c06

    • SHA256

      e185b5ac05bf0947b5fd19b8f0892afa4fcbbceba5fc76ad52ae3fdef2045829

    • SHA512

      aec1486ae4e64e8ca59baaf7a623fc4c6b56a3b3bcb6e46cadf82350799edfc62ede7bdb54fcbce490c5506e39f1dc778be160c130edcb6784667a448dafc811

    • SSDEEP

      49152:Yg0GkQNDv4gz+LzRdo/msRu92zAPZHPPumf7BQOyCEJ7eAPDbn5m0IcQgZV0Cego:yLNdo/TRuMyfPyCk7eIZIcQ0Ogo

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks