General

  • Target

    0c6b949623ff2665ed436d580b0f438a33eb5de97310a3e1644bfe02f25ce8b7

  • Size

    724KB

  • Sample

    211015-l2vabaagd9

  • MD5

    d803cf7b3353802118337aa32c6d03f3

  • SHA1

    c28f295139b4ad7a292dc55cbb9ab1807a98e924

  • SHA256

    0c6b949623ff2665ed436d580b0f438a33eb5de97310a3e1644bfe02f25ce8b7

  • SHA512

    4c760a7fba97569245707f1dda0d6d7baac1f3ace29ac666991a7002757a26dd336f344d1e797d74c52ff3145387ff07e13f1ef70dee4e15a88da1bfa1f067b6

Malware Config

Extracted

Family

vidar

Version

41.3

Botnet

1008

C2

https://mas.to/@oleg98

Attributes
  • profile_id

    1008

Targets

    • Target

      0c6b949623ff2665ed436d580b0f438a33eb5de97310a3e1644bfe02f25ce8b7

    • Size

      724KB

    • MD5

      d803cf7b3353802118337aa32c6d03f3

    • SHA1

      c28f295139b4ad7a292dc55cbb9ab1807a98e924

    • SHA256

      0c6b949623ff2665ed436d580b0f438a33eb5de97310a3e1644bfe02f25ce8b7

    • SHA512

      4c760a7fba97569245707f1dda0d6d7baac1f3ace29ac666991a7002757a26dd336f344d1e797d74c52ff3145387ff07e13f1ef70dee4e15a88da1bfa1f067b6

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Tasks