General

  • Target

    3ccf44c470e00c5f42ca53044a0609ab

  • Size

    739KB

  • Sample

    210911-zvah8abgc9

  • MD5

    3ccf44c470e00c5f42ca53044a0609ab

  • SHA1

    66f43a87c7166f1c7a82460543847fc50b195313

  • SHA256

    201b9ae09934efbe33dd9ac919d1a6600cdf336bf60ea50c8d2078caed49dfe3

  • SHA512

    0ab7e80263f96329351bb45b23351e77f38ca6588bc62102f782c788d7908789a7cc6e2778b722afecd15dcdbce16adc4dd534dfcbfa43fb2a4c9a5c3aeab6d8

Malware Config

Extracted

Family

vidar

Version

40.5

Botnet

824

C2

https://gheorghip.tumblr.com/

Attributes
  • profile_id

    824

Targets

    • Target

      3ccf44c470e00c5f42ca53044a0609ab

    • Size

      739KB

    • MD5

      3ccf44c470e00c5f42ca53044a0609ab

    • SHA1

      66f43a87c7166f1c7a82460543847fc50b195313

    • SHA256

      201b9ae09934efbe33dd9ac919d1a6600cdf336bf60ea50c8d2078caed49dfe3

    • SHA512

      0ab7e80263f96329351bb45b23351e77f38ca6588bc62102f782c788d7908789a7cc6e2778b722afecd15dcdbce16adc4dd534dfcbfa43fb2a4c9a5c3aeab6d8

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Tasks