General

  • Target

    3205fa5682b41ab60e954d5c2e8a2fc1c14c86f6c95e79869b100762d5195896

  • Size

    665KB

  • Sample

    210921-kr7l8aghh7

  • MD5

    c5e25901abb63937bcbbd759a13a301e

  • SHA1

    bfc38e1247211206d47b160b1d517b131c31d880

  • SHA256

    3205fa5682b41ab60e954d5c2e8a2fc1c14c86f6c95e79869b100762d5195896

  • SHA512

    d73f541d737795cce8363aed515245fd31f0dc35bf091bdef78e77075b0e92cb451ef2d756a43d7dc01f9888b319f8945cec2777e708a79a4be18028781878bc

Malware Config

Extracted

Family

vidar

Version

40.8

Botnet

828

C2

https://pavlovoler.tumblr.com/

Attributes
  • profile_id

    828

Targets

    • Target

      3205fa5682b41ab60e954d5c2e8a2fc1c14c86f6c95e79869b100762d5195896

    • Size

      665KB

    • MD5

      c5e25901abb63937bcbbd759a13a301e

    • SHA1

      bfc38e1247211206d47b160b1d517b131c31d880

    • SHA256

      3205fa5682b41ab60e954d5c2e8a2fc1c14c86f6c95e79869b100762d5195896

    • SHA512

      d73f541d737795cce8363aed515245fd31f0dc35bf091bdef78e77075b0e92cb451ef2d756a43d7dc01f9888b319f8945cec2777e708a79a4be18028781878bc

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Tasks