General

  • Target

    07790787a09c4f2fc99f6c6c5371fabf18bc10f0eddb98acf53ac9a6180a458f

  • Size

    771KB

  • Sample

    210721-9m6dcjyba2

  • MD5

    bc15f8a095713173f89f7ce386fbe1cf

  • SHA1

    046434d2233da37abb57cd128c83e4ed0c153843

  • SHA256

    07790787a09c4f2fc99f6c6c5371fabf18bc10f0eddb98acf53ac9a6180a458f

  • SHA512

    106dccad5e7775473e90598db77ad7411cd937196f81c127f53ddcc376a0ecbc147fd30cb70824018ad95b9c24869d4bbc2539cd51bf063a7abb59920e5aac32

Malware Config

Extracted

Family

vidar

Version

39.6

Botnet

517

C2

https://sslamlssa1.tumblr.com/

Attributes
  • profile_id

    517

Targets

    • Target

      07790787a09c4f2fc99f6c6c5371fabf18bc10f0eddb98acf53ac9a6180a458f

    • Size

      771KB

    • MD5

      bc15f8a095713173f89f7ce386fbe1cf

    • SHA1

      046434d2233da37abb57cd128c83e4ed0c153843

    • SHA256

      07790787a09c4f2fc99f6c6c5371fabf18bc10f0eddb98acf53ac9a6180a458f

    • SHA512

      106dccad5e7775473e90598db77ad7411cd937196f81c127f53ddcc376a0ecbc147fd30cb70824018ad95b9c24869d4bbc2539cd51bf063a7abb59920e5aac32

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks