General

  • Target

    74BAFD56C1FB3CDEBF0A63DE4FFB6F16DC1D5CEE38E11.exe

  • Size

    5.5MB

  • Sample

    211017-nc5qvsdddl

  • MD5

    ca08876db58056ad35cadc2afeb89ab7

  • SHA1

    e18efa556280140ff92048fa499d729aa4bce089

  • SHA256

    74bafd56c1fb3cdebf0a63de4ffb6f16dc1d5cee38e11ab0d2bc2614538da65f

  • SHA512

    c801c8019c911e2e298907fb5ac116d635e4a6b7227db7547908653f7cd680c0ebf71dba3660b8bbc87cfe3df4f8c6fbc332f11cb719466d5b311e7a721bfa27

Malware Config

Extracted

Family

vidar

Version

40.3

Botnet

706

C2

https://lenko349.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

redline

Botnet

pab777

C2

185.215.113.15:6043

Extracted

Family

vidar

Version

41.4

Botnet

937

C2

https://mas.to/@sslam

Attributes
  • profile_id

    937

Targets

    • Target

      74BAFD56C1FB3CDEBF0A63DE4FFB6F16DC1D5CEE38E11.exe

    • Size

      5.5MB

    • MD5

      ca08876db58056ad35cadc2afeb89ab7

    • SHA1

      e18efa556280140ff92048fa499d729aa4bce089

    • SHA256

      74bafd56c1fb3cdebf0a63de4ffb6f16dc1d5cee38e11ab0d2bc2614538da65f

    • SHA512

      c801c8019c911e2e298907fb5ac116d635e4a6b7227db7547908653f7cd680c0ebf71dba3660b8bbc87cfe3df4f8c6fbc332f11cb719466d5b311e7a721bfa27

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

2
T1031

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks