General

  • Target

    319de6f780483aeba82b13c37f1796d2f45c830c64800d1696adc7c059d7c461

  • Size

    743KB

  • Sample

    211013-gc411adddl

  • MD5

    3f35c88a1f457f99a494a28aa8a9c036

  • SHA1

    c8601fdc906e63ea7cc827be55ab562b49e97189

  • SHA256

    319de6f780483aeba82b13c37f1796d2f45c830c64800d1696adc7c059d7c461

  • SHA512

    f016d8a0503c88fa4aa5769a85254e4bd47c39f9092eee6c888be258e6c8a68c61781e706297a9d777dab90907d26f41c2a9ebbd15b4a92ae9162b419ed9bcfb

Malware Config

Extracted

Family

vidar

Version

41.3

Botnet

1008

C2

https://mas.to/@oleg98

Attributes
  • profile_id

    1008

Targets

    • Target

      319de6f780483aeba82b13c37f1796d2f45c830c64800d1696adc7c059d7c461

    • Size

      743KB

    • MD5

      3f35c88a1f457f99a494a28aa8a9c036

    • SHA1

      c8601fdc906e63ea7cc827be55ab562b49e97189

    • SHA256

      319de6f780483aeba82b13c37f1796d2f45c830c64800d1696adc7c059d7c461

    • SHA512

      f016d8a0503c88fa4aa5769a85254e4bd47c39f9092eee6c888be258e6c8a68c61781e706297a9d777dab90907d26f41c2a9ebbd15b4a92ae9162b419ed9bcfb

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Tasks