General

  • Target

    49bcbb42223757d240ccd605c8befefcb38e92aaa87ce09fa0b26ea4a6d9fb34

  • Size

    1.2MB

  • Sample

    210814-wj1beezbve

  • MD5

    0eb416a88971dab567b9c93816736010

  • SHA1

    22bfe6efe4155283878fe3aff46b800ca9b6a3d1

  • SHA256

    49bcbb42223757d240ccd605c8befefcb38e92aaa87ce09fa0b26ea4a6d9fb34

  • SHA512

    24a30d480b068c0ebf8556d890cf27305697b7bd9f2f8d61bfd30ab046480d7cf537d429391e044183235507a5ba47562a89ae98806f068ee2747a275df6ec29

Malware Config

Extracted

Family

vidar

Version

40

Botnet

921

C2

https://lenak513.tumblr.com/

Attributes
  • profile_id

    921

Targets

    • Target

      49bcbb42223757d240ccd605c8befefcb38e92aaa87ce09fa0b26ea4a6d9fb34

    • Size

      1.2MB

    • MD5

      0eb416a88971dab567b9c93816736010

    • SHA1

      22bfe6efe4155283878fe3aff46b800ca9b6a3d1

    • SHA256

      49bcbb42223757d240ccd605c8befefcb38e92aaa87ce09fa0b26ea4a6d9fb34

    • SHA512

      24a30d480b068c0ebf8556d890cf27305697b7bd9f2f8d61bfd30ab046480d7cf537d429391e044183235507a5ba47562a89ae98806f068ee2747a275df6ec29

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks