General

  • Target

    a53b1a3e69db3ed4ba1e36838cf703a86de8fd2f1febd79a9ae6bd227812ebbe

  • Size

    674KB

  • Sample

    211014-fgasaagabk

  • MD5

    0b3d012d4860ecb90c4eb174bbe84f45

  • SHA1

    292fa655281bd676705fdf8caccd59111d1f8893

  • SHA256

    a53b1a3e69db3ed4ba1e36838cf703a86de8fd2f1febd79a9ae6bd227812ebbe

  • SHA512

    845f56d37fcd5def7ee5f3592108dabd22a4902d918ac0c15a5973941e17ace312c2cf530bcf5e3b3fee177894f2cc8a4940031b99fd8a227a83106c9215f5f7

Malware Config

Extracted

Family

vidar

Version

41.3

Botnet

903

C2

https://mas.to/@oleg98

Attributes
  • profile_id

    903

Targets

    • Target

      a53b1a3e69db3ed4ba1e36838cf703a86de8fd2f1febd79a9ae6bd227812ebbe

    • Size

      674KB

    • MD5

      0b3d012d4860ecb90c4eb174bbe84f45

    • SHA1

      292fa655281bd676705fdf8caccd59111d1f8893

    • SHA256

      a53b1a3e69db3ed4ba1e36838cf703a86de8fd2f1febd79a9ae6bd227812ebbe

    • SHA512

      845f56d37fcd5def7ee5f3592108dabd22a4902d918ac0c15a5973941e17ace312c2cf530bcf5e3b3fee177894f2cc8a4940031b99fd8a227a83106c9215f5f7

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Tasks