General

  • Target

    8a2b3b8e6b4b4dd888503f88003177f842b8601a43397a8abb5827e866ab2c70

  • Size

    4.7MB

  • Sample

    240622-pbh15s1fjl

  • MD5

    1570c3c8a9782660e2e96a584d620c68

  • SHA1

    4710a5198ddfb7a6af032ea783136b03bd7bea19

  • SHA256

    8a2b3b8e6b4b4dd888503f88003177f842b8601a43397a8abb5827e866ab2c70

  • SHA512

    e66186ae33d9858ca6bccb399c8dbba1d36f5799c5a11415dc163637987105bd9753eb703959dffc0319c713b56fc174182bf3e88de7137b34ec7cae8404de2f

  • SSDEEP

    49152:rwLX3Ex3SWH8pLzjJiqA4H4zu4vcCPXkyb9X4iPEAylTcUoFgZV0CX99:rwLXUx3H8dxirvHvbT8AocUoF0d

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

Version

10.1

Botnet

cac73a25dd295fef8853d330a75f6da4

C2

https://t.me/memve4erin

https://steamcommunity.com/profiles/76561199699680841

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0

Extracted

Family

risepro

C2

5.42.67.8:50500

Targets

    • Target

      8a2b3b8e6b4b4dd888503f88003177f842b8601a43397a8abb5827e866ab2c70

    • Size

      4.7MB

    • MD5

      1570c3c8a9782660e2e96a584d620c68

    • SHA1

      4710a5198ddfb7a6af032ea783136b03bd7bea19

    • SHA256

      8a2b3b8e6b4b4dd888503f88003177f842b8601a43397a8abb5827e866ab2c70

    • SHA512

      e66186ae33d9858ca6bccb399c8dbba1d36f5799c5a11415dc163637987105bd9753eb703959dffc0319c713b56fc174182bf3e88de7137b34ec7cae8404de2f

    • SSDEEP

      49152:rwLX3Ex3SWH8pLzjJiqA4H4zu4vcCPXkyb9X4iPEAylTcUoFgZV0CX99:rwLXUx3H8dxirvHvbT8AocUoF0d

    • Detect Vidar Stealer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks