General

  • Target

    a592b3c40313a8d7543b067776c582b27c5a6ea9700dc44451cf44e8a4fa0440

  • Size

    681KB

  • Sample

    211014-a7g2dsfccl

  • MD5

    68d0f2b6bc21e482f407422b3cd1c9b2

  • SHA1

    418e7f843a8b2345784365b98ff2ee86a492b872

  • SHA256

    a592b3c40313a8d7543b067776c582b27c5a6ea9700dc44451cf44e8a4fa0440

  • SHA512

    14b31c2c7e90a29cacbf03b77b32ff4990b51ed69374341e9ac8dc16dbc7191fadbc5b068be345bdc3b3441972c22569e7ae9ea97b518e2bc913c766cfb2f10a

Malware Config

Extracted

Family

vidar

Version

41.3

Botnet

1008

C2

https://mas.to/@oleg98

Attributes
  • profile_id

    1008

Targets

    • Target

      a592b3c40313a8d7543b067776c582b27c5a6ea9700dc44451cf44e8a4fa0440

    • Size

      681KB

    • MD5

      68d0f2b6bc21e482f407422b3cd1c9b2

    • SHA1

      418e7f843a8b2345784365b98ff2ee86a492b872

    • SHA256

      a592b3c40313a8d7543b067776c582b27c5a6ea9700dc44451cf44e8a4fa0440

    • SHA512

      14b31c2c7e90a29cacbf03b77b32ff4990b51ed69374341e9ac8dc16dbc7191fadbc5b068be345bdc3b3441972c22569e7ae9ea97b518e2bc913c766cfb2f10a

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

      suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

    • suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

      suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

    • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

      suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Tasks