General

  • Target

    a66ed6740deb55cd92216f556c7c15fdcf7697c7b4c70891fc0cad901da16d48

  • Size

    770KB

  • Sample

    210722-2vswqyyhvj

  • MD5

    57ea6784a0d59a7e9d28115727da7c47

  • SHA1

    6d40f68df4ddd5cfd01fb70055736f1c87a73e1d

  • SHA256

    a66ed6740deb55cd92216f556c7c15fdcf7697c7b4c70891fc0cad901da16d48

  • SHA512

    e67ea92a6a32c6d0dadbb37a1c8d7e3689c457c4707cf5daf51c22c47b003a3026f631293035112b9c725467f7e704b454c1b7ca17d4dd4e78ba97a7c2624188

Malware Config

Extracted

Family

vidar

Version

39.6

Botnet

517

C2

https://sslamlssa1.tumblr.com/

Attributes
  • profile_id

    517

Targets

    • Target

      a66ed6740deb55cd92216f556c7c15fdcf7697c7b4c70891fc0cad901da16d48

    • Size

      770KB

    • MD5

      57ea6784a0d59a7e9d28115727da7c47

    • SHA1

      6d40f68df4ddd5cfd01fb70055736f1c87a73e1d

    • SHA256

      a66ed6740deb55cd92216f556c7c15fdcf7697c7b4c70891fc0cad901da16d48

    • SHA512

      e67ea92a6a32c6d0dadbb37a1c8d7e3689c457c4707cf5daf51c22c47b003a3026f631293035112b9c725467f7e704b454c1b7ca17d4dd4e78ba97a7c2624188

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks