General

  • Target

    d5630b0bd4a32f7f0494ff146ff149d45cbce7fcd994463733e2fc67c2a17089

  • Size

    1.5MB

  • Sample

    210923-pc5arsedd4

  • MD5

    cb88ac312cbb52b9e38a6faf88adc5d4

  • SHA1

    077f5657e9291c4d718953501f9d4203a5c60365

  • SHA256

    d5630b0bd4a32f7f0494ff146ff149d45cbce7fcd994463733e2fc67c2a17089

  • SHA512

    22ecdcf215500589e7cb5ccc96cae99140cd20410dd8aef3035298a7e006e6fddd58a7404d8dcd8fd72725186d1de326d21a06152d314180804d5685f778ba40

Malware Config

Extracted

Family

vidar

Version

41

Botnet

1013

C2

https://mas.to/@killern0

Attributes
  • profile_id

    1013

Targets

    • Target

      d5630b0bd4a32f7f0494ff146ff149d45cbce7fcd994463733e2fc67c2a17089

    • Size

      1.5MB

    • MD5

      cb88ac312cbb52b9e38a6faf88adc5d4

    • SHA1

      077f5657e9291c4d718953501f9d4203a5c60365

    • SHA256

      d5630b0bd4a32f7f0494ff146ff149d45cbce7fcd994463733e2fc67c2a17089

    • SHA512

      22ecdcf215500589e7cb5ccc96cae99140cd20410dd8aef3035298a7e006e6fddd58a7404d8dcd8fd72725186d1de326d21a06152d314180804d5685f778ba40

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks