General

  • Target

    0398f85df216a2e95e792853f215431fc1983928a7f596ea6cd135924c66e258_NeikiAnalytics.exe

  • Size

    407KB

  • Sample

    240629-1trxjsxbrg

  • MD5

    d0e9e6aac645b8c5af9f51430c75f9c0

  • SHA1

    990407a4f8ddb6ca93d63f421d9a61b778669e95

  • SHA256

    0398f85df216a2e95e792853f215431fc1983928a7f596ea6cd135924c66e258

  • SHA512

    379aa05c9c0092bdb32b61cc0ae8489939c6bfcc9e95251442b00c855bb22bff6ee9a338e2eb936e0e1a16edec4e5b95e37925dadedf5dadac05f1759eec2205

  • SSDEEP

    6144:nfI3vziGwqHxAw69zwPrDazpLr+mEY/6ft/5CScHbgrtUThx37iQ1mMY4wJ2s3:nA3riGwqHxFBWEY/ah5aIUbriQrjw

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

Version

10.1

Botnet

673ad4d1558c47b58d4f59c1d86488e2

C2

https://t.me/memve4erin

https://steamcommunity.com/profiles/76561199699680841

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0

Targets

    • Target

      0398f85df216a2e95e792853f215431fc1983928a7f596ea6cd135924c66e258_NeikiAnalytics.exe

    • Size

      407KB

    • MD5

      d0e9e6aac645b8c5af9f51430c75f9c0

    • SHA1

      990407a4f8ddb6ca93d63f421d9a61b778669e95

    • SHA256

      0398f85df216a2e95e792853f215431fc1983928a7f596ea6cd135924c66e258

    • SHA512

      379aa05c9c0092bdb32b61cc0ae8489939c6bfcc9e95251442b00c855bb22bff6ee9a338e2eb936e0e1a16edec4e5b95e37925dadedf5dadac05f1759eec2205

    • SSDEEP

      6144:nfI3vziGwqHxAw69zwPrDazpLr+mEY/6ft/5CScHbgrtUThx37iQ1mMY4wJ2s3:nA3riGwqHxFBWEY/ah5aIUbriQrjw

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

4
T1552

Credentials In Files

4
T1552.001

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

4
T1005

Tasks