General

  • Target

    96425c834e7cc2563de736060a797b262934c766dc7425096c2e8f88b6ada833

  • Size

    675KB

  • Sample

    211014-dv1vhsfha7

  • MD5

    76d25383420123fe16070d0c9346ce77

  • SHA1

    0c0230dd20b2794ab7069798f1e7c0fbf915d415

  • SHA256

    96425c834e7cc2563de736060a797b262934c766dc7425096c2e8f88b6ada833

  • SHA512

    338027a19c3e8859419f3f33ca06331a59e203714b9429dce61e6b74c7b19ba454ce368be7fb60af2a8d16eb99e8d59f8dceb390b1c730ba756a4a4724587d6a

Malware Config

Extracted

Family

vidar

Version

41.3

Botnet

1008

C2

https://mas.to/@oleg98

Attributes
  • profile_id

    1008

Targets

    • Target

      96425c834e7cc2563de736060a797b262934c766dc7425096c2e8f88b6ada833

    • Size

      675KB

    • MD5

      76d25383420123fe16070d0c9346ce77

    • SHA1

      0c0230dd20b2794ab7069798f1e7c0fbf915d415

    • SHA256

      96425c834e7cc2563de736060a797b262934c766dc7425096c2e8f88b6ada833

    • SHA512

      338027a19c3e8859419f3f33ca06331a59e203714b9429dce61e6b74c7b19ba454ce368be7fb60af2a8d16eb99e8d59f8dceb390b1c730ba756a4a4724587d6a

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Tasks