General

  • Target

    7e87bb624ca8aebac6a71494ac7d190e1266ad509ce872c0cecf7695eccfe657

  • Size

    5.7MB

  • Sample

    240622-nn9tysweqg

  • MD5

    9f9be61292c62089a46a872961cae046

  • SHA1

    093e4fa849ad041d3237eeba9c1de4dfc1446ffa

  • SHA256

    7e87bb624ca8aebac6a71494ac7d190e1266ad509ce872c0cecf7695eccfe657

  • SHA512

    8263e6a3f173a5339487637a1e2e6712602b7143e08034a37a2c73c9d191f7b9d423e1314627c016f4c905d47244f43d16959ab13aeae5a07ab8f08932c07227

  • SSDEEP

    98304:3wCLKnCmxzvm3VZ2NVPClN4QxjK5TBJ5Kw19sbQ0G3chMdKBC:bLKCm0GNhC8b5tHTjaMdd

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

Version

10.1

Botnet

56561c66bf3314a2b5cad65677212bfe

C2

https://t.me/memve4erin

https://steamcommunity.com/profiles/76561199699680841

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0

Extracted

Family

risepro

C2

5.42.67.8:50500

Targets

    • Target

      7e87bb624ca8aebac6a71494ac7d190e1266ad509ce872c0cecf7695eccfe657

    • Size

      5.7MB

    • MD5

      9f9be61292c62089a46a872961cae046

    • SHA1

      093e4fa849ad041d3237eeba9c1de4dfc1446ffa

    • SHA256

      7e87bb624ca8aebac6a71494ac7d190e1266ad509ce872c0cecf7695eccfe657

    • SHA512

      8263e6a3f173a5339487637a1e2e6712602b7143e08034a37a2c73c9d191f7b9d423e1314627c016f4c905d47244f43d16959ab13aeae5a07ab8f08932c07227

    • SSDEEP

      98304:3wCLKnCmxzvm3VZ2NVPClN4QxjK5TBJ5Kw19sbQ0G3chMdKBC:bLKCm0GNhC8b5tHTjaMdd

    • Detect Vidar Stealer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks