General

  • Target

    1e981e240cc21580c970db894934da5f.exe

  • Size

    800KB

  • Sample

    210804-bjczhtbz5x

  • MD5

    1e981e240cc21580c970db894934da5f

  • SHA1

    24bc2e53f10324268b5ba1542568d9e998a1052b

  • SHA256

    26285efdd77665c7dd35aa0450f77214644ebb80fb284e071e67f728881c8983

  • SHA512

    24c9968c7fbe3f341801e723be26dc083939238a94234374e1eb7821360119e6c8efdcd481ab68de2007fcae1a39b897f4b1198cc43a965577a0982272413844

Malware Config

Extracted

Family

vidar

Version

39.9

Botnet

921

C2

https://prophefliloc.tumblr.com/

Attributes
  • profile_id

    921

Targets

    • Target

      1e981e240cc21580c970db894934da5f.exe

    • Size

      800KB

    • MD5

      1e981e240cc21580c970db894934da5f

    • SHA1

      24bc2e53f10324268b5ba1542568d9e998a1052b

    • SHA256

      26285efdd77665c7dd35aa0450f77214644ebb80fb284e071e67f728881c8983

    • SHA512

      24c9968c7fbe3f341801e723be26dc083939238a94234374e1eb7821360119e6c8efdcd481ab68de2007fcae1a39b897f4b1198cc43a965577a0982272413844

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks