General

  • Target

    1bd335fdd3217b9b4f47e84a49a2d89270af55b352a3cba97ed883893b74b5fd

  • Size

    722KB

  • Sample

    211016-m9v29abhe8

  • MD5

    700b7df670df22fb531ddba5713e2fb7

  • SHA1

    0349126d37bae630dde77206d17e64fe1c8accee

  • SHA256

    1bd335fdd3217b9b4f47e84a49a2d89270af55b352a3cba97ed883893b74b5fd

  • SHA512

    4cbdca937466a584c2d2f497199cc1b31a4757685709a553981b3320c8b9998d0a513e8fe88aaebdba0b616369db67fbd734117c951843c3a993128f26464e0b

Malware Config

Extracted

Family

vidar

Version

41.4

Botnet

1008

C2

https://mas.to/@sslam

Attributes
  • profile_id

    1008

Targets

    • Target

      1bd335fdd3217b9b4f47e84a49a2d89270af55b352a3cba97ed883893b74b5fd

    • Size

      722KB

    • MD5

      700b7df670df22fb531ddba5713e2fb7

    • SHA1

      0349126d37bae630dde77206d17e64fe1c8accee

    • SHA256

      1bd335fdd3217b9b4f47e84a49a2d89270af55b352a3cba97ed883893b74b5fd

    • SHA512

      4cbdca937466a584c2d2f497199cc1b31a4757685709a553981b3320c8b9998d0a513e8fe88aaebdba0b616369db67fbd734117c951843c3a993128f26464e0b

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Tasks