Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-11-2024 19:59
Behavioral task
behavioral1
Sample
stealerc.exe
Resource
win11-20241007-en
General
-
Target
stealerc.exe
-
Size
824KB
-
MD5
48f8fd860361571c1ea6373fa9929fdd
-
SHA1
1940e67c060a7b2b7085ba8513cd69d97c035775
-
SHA256
0d29542a4e177ab50ea5ac6ffad38e4ac31bf199f6de30334b73b0ab04c0f20c
-
SHA512
f2145f41c822d57f079b03a24e86595bfc29dc1daca199be0fa56a3f054e622624f70f6a9084f02e369ca7c6c594f07230da260708142dcec64dedef8c9b48a6
-
SSDEEP
6144:M58tl+4sfTny7TuvpdZlt4DIJYVKWi8u5yrh5rTNhhuy1qkteGtLMA+/mt9:M58tl+TtvtGyYKW5u8lq6T+/s
Malware Config
Extracted
vidar
11.7
93fc6460673f6002db33ceb23a9e1868
https://t.me/m07mbk
https://steamcommunity.com/profiles/76561199801589826
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Signatures
-
Detect Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/3972-0-0x0000000000720000-0x0000000000979000-memory.dmp family_vidar_v7 behavioral1/memory/3972-18-0x0000000000720000-0x0000000000979000-memory.dmp family_vidar_v7 -
Stealc family
-
Vidar family
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealerc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealerc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealerc.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2020 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3972 stealerc.exe 3972 stealerc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3972 wrote to memory of 3340 3972 stealerc.exe 77 PID 3972 wrote to memory of 3340 3972 stealerc.exe 77 PID 3972 wrote to memory of 3340 3972 stealerc.exe 77 PID 3340 wrote to memory of 2020 3340 cmd.exe 79 PID 3340 wrote to memory of 2020 3340 cmd.exe 79 PID 3340 wrote to memory of 2020 3340 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\stealerc.exe"C:\Users\Admin\AppData\Local\Temp\stealerc.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\stealerc.exe" & rd /s /q "C:\ProgramData\JEGDGIIJJECF" & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\timeout.exetimeout /t 103⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2020
-
-