General

  • Target

    afe2301709a95067f236b209d744b16a7f51b4c6e7f00ecde446212a885e8cb2

  • Size

    771KB

  • Sample

    210721-k9cr7ls6as

  • MD5

    d3cdef653cb51e6f86d094b18c7b09d2

  • SHA1

    3f53563da7fb1c2cbd3cc918859c8285c4399c27

  • SHA256

    afe2301709a95067f236b209d744b16a7f51b4c6e7f00ecde446212a885e8cb2

  • SHA512

    105cd18e20473256dd3161b4ed1ef3d2ef76d03050783bb052810501a2642319af8b9f264ab0dccde15b06196138dd50a713d26afdd4c2667475d9a518b7dc74

Malware Config

Extracted

Family

vidar

Version

39.6

Botnet

517

C2

https://sslamlssa1.tumblr.com/

Attributes
  • profile_id

    517

Targets

    • Target

      afe2301709a95067f236b209d744b16a7f51b4c6e7f00ecde446212a885e8cb2

    • Size

      771KB

    • MD5

      d3cdef653cb51e6f86d094b18c7b09d2

    • SHA1

      3f53563da7fb1c2cbd3cc918859c8285c4399c27

    • SHA256

      afe2301709a95067f236b209d744b16a7f51b4c6e7f00ecde446212a885e8cb2

    • SHA512

      105cd18e20473256dd3161b4ed1ef3d2ef76d03050783bb052810501a2642319af8b9f264ab0dccde15b06196138dd50a713d26afdd4c2667475d9a518b7dc74

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks