General

  • Target

    arnatic_1.exe

  • Size

    686KB

  • Sample

    210708-x4k4zdmcb2

  • MD5

    a957a80658f31c8fc864755deb2a0ca7

  • SHA1

    8692ad674194f0901ee776ba99704f061babda95

  • SHA256

    99117569330d3694ed281e0c5414c23aa33a5eb370494febb267925dd4a62208

  • SHA512

    b46056d3971718a7770fef54d8a2af34363eb2e785f5506e9cb261c331954d12b810e46b297ebb98ccdf7f9bde73290d46491aa7a3276bdef51869651f7105af

Malware Config

Extracted

Family

vidar

Version

39.4

Botnet

706

C2

https://sergeevih43.tumblr.com

Attributes
  • profile_id

    706

Targets

    • Target

      arnatic_1.exe

    • Size

      686KB

    • MD5

      a957a80658f31c8fc864755deb2a0ca7

    • SHA1

      8692ad674194f0901ee776ba99704f061babda95

    • SHA256

      99117569330d3694ed281e0c5414c23aa33a5eb370494febb267925dd4a62208

    • SHA512

      b46056d3971718a7770fef54d8a2af34363eb2e785f5506e9cb261c331954d12b810e46b297ebb98ccdf7f9bde73290d46491aa7a3276bdef51869651f7105af

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Tasks