General

  • Target

    7b3b8ff29a637b35e699c7ab427a26fd1447b0d05cfed0c8e453b6b53880aaf8

  • Size

    729KB

  • Sample

    210722-69xmqdcc7a

  • MD5

    7c756d9551182d2d35ace140ff34c80d

  • SHA1

    92d6eaca7822e1a481643a493dc03fd704f5af7f

  • SHA256

    7b3b8ff29a637b35e699c7ab427a26fd1447b0d05cfed0c8e453b6b53880aaf8

  • SHA512

    b2a9df775410551811ee962be0178f02c80c5b9547703eea73391b62a65f0f2f476f784d988688b87b2e5e3e67e66282ce731a65ba0bc311b9f7a324f8238cf4

Malware Config

Extracted

Family

vidar

Version

39.6

Botnet

517

C2

https://sslamlssa1.tumblr.com/

Attributes
  • profile_id

    517

Targets

    • Target

      7b3b8ff29a637b35e699c7ab427a26fd1447b0d05cfed0c8e453b6b53880aaf8

    • Size

      729KB

    • MD5

      7c756d9551182d2d35ace140ff34c80d

    • SHA1

      92d6eaca7822e1a481643a493dc03fd704f5af7f

    • SHA256

      7b3b8ff29a637b35e699c7ab427a26fd1447b0d05cfed0c8e453b6b53880aaf8

    • SHA512

      b2a9df775410551811ee962be0178f02c80c5b9547703eea73391b62a65f0f2f476f784d988688b87b2e5e3e67e66282ce731a65ba0bc311b9f7a324f8238cf4

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks