General

  • Target

    ce7c7b7a2699a304fcb6bad925f5ddf29fe00cb4ffe23593fe729b6e452dff7b

  • Size

    771KB

  • Sample

    210721-dfvxxddvmx

  • MD5

    248dd609e61ae13b52cbaebd8f92d07f

  • SHA1

    430b2b3812d6b08721c063f73559e609941cf85d

  • SHA256

    ce7c7b7a2699a304fcb6bad925f5ddf29fe00cb4ffe23593fe729b6e452dff7b

  • SHA512

    3adda33cc2a41f3123624437e87897b409526aecc821d0021056a65c881c3d224259a8e858172328076e89455b5a3cfa18bf6a4279490736f0a2141f75da21e9

Malware Config

Extracted

Family

vidar

Version

39.6

Botnet

517

C2

https://sslamlssa1.tumblr.com/

Attributes
  • profile_id

    517

Targets

    • Target

      ce7c7b7a2699a304fcb6bad925f5ddf29fe00cb4ffe23593fe729b6e452dff7b

    • Size

      771KB

    • MD5

      248dd609e61ae13b52cbaebd8f92d07f

    • SHA1

      430b2b3812d6b08721c063f73559e609941cf85d

    • SHA256

      ce7c7b7a2699a304fcb6bad925f5ddf29fe00cb4ffe23593fe729b6e452dff7b

    • SHA512

      3adda33cc2a41f3123624437e87897b409526aecc821d0021056a65c881c3d224259a8e858172328076e89455b5a3cfa18bf6a4279490736f0a2141f75da21e9

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks