General

  • Target

    c513c1da60b31eaa8b46870f9f0e29ff.exe

  • Size

    1.4MB

  • Sample

    210811-hs8z3hlqpa

  • MD5

    c513c1da60b31eaa8b46870f9f0e29ff

  • SHA1

    b564919aeb814216d09f6a79221efcf7a22de7b6

  • SHA256

    a2ac6fd6156acf555c5eabc6a1bd33d03f6d569ae5a9485c6c6619d6292fde01

  • SHA512

    13f1d7ecab6c705445eac1c7a84695f7672fcf37e756776b172dabde739d5db1f25980203d2789b372ef5a18773699060d4174c2b65964794e67ae42f5d87503

Malware Config

Extracted

Family

vidar

Version

40

Botnet

921

C2

https://lenak513.tumblr.com/

Attributes
  • profile_id

    921

Targets

    • Target

      c513c1da60b31eaa8b46870f9f0e29ff.exe

    • Size

      1.4MB

    • MD5

      c513c1da60b31eaa8b46870f9f0e29ff

    • SHA1

      b564919aeb814216d09f6a79221efcf7a22de7b6

    • SHA256

      a2ac6fd6156acf555c5eabc6a1bd33d03f6d569ae5a9485c6c6619d6292fde01

    • SHA512

      13f1d7ecab6c705445eac1c7a84695f7672fcf37e756776b172dabde739d5db1f25980203d2789b372ef5a18773699060d4174c2b65964794e67ae42f5d87503

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks