""ET TROJAN [ANY.RUN] Stealc/Vidar Stealer TLS Certificate""

SID: 2049253

Revision: 1

Class Type: trojan-activity

Metadata: attack_target Client_Endpoint, created_at 2023_11_17, deployment Perimeter, malware_family Stealc, malware_family VidarStealer, confidence High, signature_severity Major, updated_at 2023_12_28

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: 443

Destination Network: $HOME_NET

Destination Port: any

Flow: established,to_client

Contents:

  • Value: "|16|"

  • Value: "|0b|"

  • Value: "|06 03 55 04 03|"

  • Value: "|00|"

  • Value: "|06 03 55 04 0b|"

  • Value: "|09|privateIP"

  • Value: "|06 03 55 04 0a|"

  • Value: "|08|StaticIP"

  • Value: "|06 03 55 04 07|"

  • Value: "|02|NY"

  • Value: "|06 03 55 04 08|"

  • Value: "|02|NY"

  • Value: "|06 03 55 04 06|"

  • Value: "|02|XX"

Within: 3

PCRE: "/^(?:25[0-5]|2[0-4]\d|[0-1]?\d{1,2})(?:.(?:25[0-5]|2[0-4]\d|[0-1]?\d{1,2})){3}$/R"

Special Options:

  • fast_pattern

source