General

  • Target

    7504bef3a7d40256b34de5c4e1f9e5a6ff1eb26b3e278a767b5b261ee4f94c20

  • Size

    733KB

  • Sample

    210922-h6seqsbhd3

  • MD5

    52d7ca3a74feb37377520d77b24578e4

  • SHA1

    49c29ea95f04414664a81cf9855370273d9ee08b

  • SHA256

    7504bef3a7d40256b34de5c4e1f9e5a6ff1eb26b3e278a767b5b261ee4f94c20

  • SHA512

    ef54b43ff40610f331840842f42ebe8f84d39ee7b00b321862fd30880d2e79d71ca1431f88aa9746e383d1ebf79391345145e3c5799954e66fa75ed1f6a6b051

Malware Config

Extracted

Family

vidar

Version

40.9

Botnet

828

C2

https://stacenko668.tumblr.com/

Attributes
  • profile_id

    828

Targets

    • Target

      7504bef3a7d40256b34de5c4e1f9e5a6ff1eb26b3e278a767b5b261ee4f94c20

    • Size

      733KB

    • MD5

      52d7ca3a74feb37377520d77b24578e4

    • SHA1

      49c29ea95f04414664a81cf9855370273d9ee08b

    • SHA256

      7504bef3a7d40256b34de5c4e1f9e5a6ff1eb26b3e278a767b5b261ee4f94c20

    • SHA512

      ef54b43ff40610f331840842f42ebe8f84d39ee7b00b321862fd30880d2e79d71ca1431f88aa9746e383d1ebf79391345145e3c5799954e66fa75ed1f6a6b051

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Tasks