General

  • Target

    bf2b3900f5c0c83cc6c118bfcdca720c6f7ed4331042d716ac0929a0b6c108e5

  • Size

    817KB

  • Sample

    210808-w1ze3pqgf2

  • MD5

    18c518c069c62be9595f33f5c6a76b98

  • SHA1

    868861d9e423a11bb1ba0673cbf7521cba173fd6

  • SHA256

    bf2b3900f5c0c83cc6c118bfcdca720c6f7ed4331042d716ac0929a0b6c108e5

  • SHA512

    a34ada42d647520b255d157e3b4d25b881c84d10ff78055c3dada02ef2a862f0d0ab134839bd3739eaa7a253a7caca4df35387f1f4b6ec24b9d03043aa45f7f2

Malware Config

Extracted

Family

vidar

Version

39.9

Botnet

921

C2

https://prophefliloc.tumblr.com/

Attributes
  • profile_id

    921

Targets

    • Target

      bf2b3900f5c0c83cc6c118bfcdca720c6f7ed4331042d716ac0929a0b6c108e5

    • Size

      817KB

    • MD5

      18c518c069c62be9595f33f5c6a76b98

    • SHA1

      868861d9e423a11bb1ba0673cbf7521cba173fd6

    • SHA256

      bf2b3900f5c0c83cc6c118bfcdca720c6f7ed4331042d716ac0929a0b6c108e5

    • SHA512

      a34ada42d647520b255d157e3b4d25b881c84d10ff78055c3dada02ef2a862f0d0ab134839bd3739eaa7a253a7caca4df35387f1f4b6ec24b9d03043aa45f7f2

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks