General

  • Target

    f426375639ad9b1f363818b840b50585d408322e840cc7d2a7367edc501a4406

  • Size

    771KB

  • Sample

    210721-zkd2vq5m7e

  • MD5

    d60cbe05f939425518b120678a0c8bd2

  • SHA1

    13936e3f5b90884393a66f57f2f5f016205cf927

  • SHA256

    f426375639ad9b1f363818b840b50585d408322e840cc7d2a7367edc501a4406

  • SHA512

    7aaece927ecb1d0d15c8a63d3021d9e9af1a6bf85f9af7434c7139d8fc0e66b7f937bb95dfba6b2e93639fe697d555a33c114be7de3d91c493c6d6d27249618a

Malware Config

Extracted

Family

vidar

Version

39.6

Botnet

517

C2

https://sslamlssa1.tumblr.com/

Attributes
  • profile_id

    517

Targets

    • Target

      f426375639ad9b1f363818b840b50585d408322e840cc7d2a7367edc501a4406

    • Size

      771KB

    • MD5

      d60cbe05f939425518b120678a0c8bd2

    • SHA1

      13936e3f5b90884393a66f57f2f5f016205cf927

    • SHA256

      f426375639ad9b1f363818b840b50585d408322e840cc7d2a7367edc501a4406

    • SHA512

      7aaece927ecb1d0d15c8a63d3021d9e9af1a6bf85f9af7434c7139d8fc0e66b7f937bb95dfba6b2e93639fe697d555a33c114be7de3d91c493c6d6d27249618a

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks