General

  • Target

    14644CC2D4377E98E15DA8E998EE6B54.exe

  • Size

    4.6MB

  • Sample

    210905-l8jr6acfhj

  • MD5

    14644cc2d4377e98e15da8e998ee6b54

  • SHA1

    c5c38e0c6df24bb414081d9221bf0e300a823c9c

  • SHA256

    022fc71a6661ab3d6efc0f7d3e560a05cceb22b31081e7cb5d882b01921d5e38

  • SHA512

    8f0e8377d373f40de089122c125de9228903fb300ed8ad303d62c7a8289e0628361f55996fc58f04456c431990a8a845e30d7c0054982a47d808b4e5c95034e2

Malware Config

Extracted

Family

vidar

Version

40.3

Botnet

706

C2

https://lenko349.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

vidar

Version

40.4

Botnet

937

C2

https://romkaxarit.tumblr.com/

Attributes
  • profile_id

    937

Targets

    • Target

      14644CC2D4377E98E15DA8E998EE6B54.exe

    • Size

      4.6MB

    • MD5

      14644cc2d4377e98e15da8e998ee6b54

    • SHA1

      c5c38e0c6df24bb414081d9221bf0e300a823c9c

    • SHA256

      022fc71a6661ab3d6efc0f7d3e560a05cceb22b31081e7cb5d882b01921d5e38

    • SHA512

      8f0e8377d373f40de089122c125de9228903fb300ed8ad303d62c7a8289e0628361f55996fc58f04456c431990a8a845e30d7c0054982a47d808b4e5c95034e2

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • VKeylogger

      A keylogger first seen in Nov 2020.

    • VKeylogger Payload

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01

      suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01

    • suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload

      suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload

    • suricata: ET MALWARE Observed Win32/Ymacco.AA36 User-Agent

      suricata: ET MALWARE Observed Win32/Ymacco.AA36 User-Agent

    • suricata: ET MALWARE Win32/Tnega Activity (GET)

      suricata: ET MALWARE Win32/Tnega Activity (GET)

    • Vidar Stealer

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Command and Control

Web Service

1
T1102

Tasks