General

  • Target

    mixshop_20211014-230224

  • Size

    666KB

  • Sample

    211014-1aqv5sacf7

  • MD5

    ba0022a82e893e3478af3d3e4ea8d33e

  • SHA1

    dafd4a5f1924eca548e6b8ff7f88fd8826eb2584

  • SHA256

    149d9555994e5930d863674a2c55d295d5a19446bed86ef1079ccbbbdae9975f

  • SHA512

    09d0c98ea9d44e1b30a5fbd451e0cfc3fb8b7b9c755b977011b4ad3c7a1616c0b037b01d3d2d9ba54b66982ad04dcfe11693ef361d97dded1f988d8743760b7f

Malware Config

Extracted

Family

vidar

Version

41.4

Botnet

1015

C2

https://mas.to/@sslam

Attributes
  • profile_id

    1015

Targets

    • Target

      mixshop_20211014-230224

    • Size

      666KB

    • MD5

      ba0022a82e893e3478af3d3e4ea8d33e

    • SHA1

      dafd4a5f1924eca548e6b8ff7f88fd8826eb2584

    • SHA256

      149d9555994e5930d863674a2c55d295d5a19446bed86ef1079ccbbbdae9975f

    • SHA512

      09d0c98ea9d44e1b30a5fbd451e0cfc3fb8b7b9c755b977011b4ad3c7a1616c0b037b01d3d2d9ba54b66982ad04dcfe11693ef361d97dded1f988d8743760b7f

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Tasks