General

  • Target

    c71d063e292f262c5a7139baffecd2114c43fca915ea60f236e69a393ea3efab

  • Size

    728KB

  • Sample

    211016-b9a7asbfb9

  • MD5

    6e2dac088aefea72ac5b026ed682825a

  • SHA1

    9571ad5928f77b0dd91238a06323d865e8035c12

  • SHA256

    c71d063e292f262c5a7139baffecd2114c43fca915ea60f236e69a393ea3efab

  • SHA512

    1d12fb49e8e07224e86ddf2590b3f5d3ae8cd337216866105d268f19af07c310dff27a0d92bf6993c5c94c6d95a1f91b380501042c68971c60b253eb660ed8f4

Malware Config

Extracted

Family

vidar

Version

41.4

Botnet

1008

C2

https://mas.to/@sslam

Attributes
  • profile_id

    1008

Targets

    • Target

      c71d063e292f262c5a7139baffecd2114c43fca915ea60f236e69a393ea3efab

    • Size

      728KB

    • MD5

      6e2dac088aefea72ac5b026ed682825a

    • SHA1

      9571ad5928f77b0dd91238a06323d865e8035c12

    • SHA256

      c71d063e292f262c5a7139baffecd2114c43fca915ea60f236e69a393ea3efab

    • SHA512

      1d12fb49e8e07224e86ddf2590b3f5d3ae8cd337216866105d268f19af07c310dff27a0d92bf6993c5c94c6d95a1f91b380501042c68971c60b253eb660ed8f4

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Tasks