General

  • Target

    3d466f3d0710f015571b152ebf917cd057e540dd7c954d04e9e89f7ebc3851b9

  • Size

    700KB

  • Sample

    210809-zdm7mynxda

  • MD5

    198a59b9bc4b0f64b0d59fd40d182e68

  • SHA1

    3dec5a926d068f094a78d282b710a65803b16488

  • SHA256

    3d466f3d0710f015571b152ebf917cd057e540dd7c954d04e9e89f7ebc3851b9

  • SHA512

    223db08c5e77a837b967ee30853e4528caa759fbfe25a7464dba85f74e3b7ce63e62e6a2aacf352ea55ae6f481b0d6c3afe63fab7481bedb2d1af06d49b0624a

Malware Config

Extracted

Family

vidar

Version

39.9

Botnet

921

C2

https://prophefliloc.tumblr.com/

Attributes
  • profile_id

    921

Targets

    • Target

      3d466f3d0710f015571b152ebf917cd057e540dd7c954d04e9e89f7ebc3851b9

    • Size

      700KB

    • MD5

      198a59b9bc4b0f64b0d59fd40d182e68

    • SHA1

      3dec5a926d068f094a78d282b710a65803b16488

    • SHA256

      3d466f3d0710f015571b152ebf917cd057e540dd7c954d04e9e89f7ebc3851b9

    • SHA512

      223db08c5e77a837b967ee30853e4528caa759fbfe25a7464dba85f74e3b7ce63e62e6a2aacf352ea55ae6f481b0d6c3afe63fab7481bedb2d1af06d49b0624a

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks