General

  • Target

    Setup.zip

  • Size

    22.9MB

  • Sample

    240629-dcnr8szane

  • MD5

    e1f55747103934ef5573148034a58eb2

  • SHA1

    b0e417041f70c3b025b40bd5f78d329c6c322d81

  • SHA256

    d688113f745fbdea695db3f1c441431617fd6e07dba111d61c24126c0b0314a4

  • SHA512

    5ac7e5680d6cea9094d25b678133ed595bfe9bec75752e0513ac161f9d7ab50627eb318a7b52ff585ba914fa1689400641113c78ea9c0b4fd886cd9a9e6ef759

  • SSDEEP

    393216:cwxNGM8CmiC0/BhMgKoz2a4kc4iocKFVIkWji+GjzEB6eng0MheLivPlpre4GDnY:cwxN3oizwcwocKFyW+EEB6eg00eGy0

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

Version

10.1

Botnet

bd7a7ef85507e39998176b88b253bdb9

C2

https://t.me/memve4erin

https://steamcommunity.com/profiles/76561199699680841

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0

Targets

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Privilege Escalation

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Credential Access

Unsecured Credentials

4
T1552

Credentials In Files

4
T1552.001

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

4
T1005

Tasks