General

  • Target

    files.rar

  • Size

    6.1MB

  • Sample

    240618-p5ssfathph

  • MD5

    47abbc9f5c6239eb1bcc2ebd056ee69c

  • SHA1

    4043935a2b58d1747555a7c1e3ace24d75f404b2

  • SHA256

    b2bf3753fffd1c058f60b8c0b9d5be9f165e92e91462729f2707534a4b3b69c2

  • SHA512

    da46aaeabf9fc117a998b383d60bc6bfa0a32beb741ba5d65b637e64ab650f44a1f11a236970875dd123b2ed5682982457785101841bebeb5448ca01c662bdae

  • SSDEEP

    98304:p0fdy3TarHa2Odp0BTSLlnZa6Qe+TC/9l8nIgovSj8k4X+eLZMNilM6dYdgMOT9:I8DaafQSLlnZa6B+TavrzvPVMklxfB

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      Setup.exe

    • Size

      446KB

    • MD5

      485008b43f0edceba0e0d3ca04bc1c1a

    • SHA1

      55ae8f105af415bb763d1b87f6572f078052877c

    • SHA256

      12c22ba646232d5d5087d0300d5cfd46fed424f26143a02dc866f1bfceab3c10

    • SHA512

      402652786daae635c7405f5fa0924d768cbde2086f9f57b10f00f921dec98e37168f5c3a6baa5593ba9a478f3971d32747c517ffd485d25634c924e6b08815b1

    • SSDEEP

      12288:vK5+DMJA3TAz4plk9iZOOti81N5y1qMIg+GV5Zul3M:y5+DMJA3TAz4plk9ijK1qlGV7ulM

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Privilege Escalation

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks