General

  • Target

    eufive_20211110-062541

  • Size

    675KB

  • Sample

    211110-m6axxaggg2

  • MD5

    acd893528dcd666797b377b94770feab

  • SHA1

    ccab720929ca7ab29257a9c9082109bae5dca644

  • SHA256

    3ca8306765d8e7196285df3a004eebf2b8cae24b1ed7cbd3d454c7a3253b59c2

  • SHA512

    15c1f1b330a523161995139941f3cb33315f6f6d6675da966138b4408bee32bf604fd8e630cf1e9d852ba23e44b455e374c1f29350eb1b4b63a752e8db9cb514

Malware Config

Extracted

Family

vidar

Version

48.1

Botnet

824

Attributes
  • profile_id

    824

Targets

    • Target

      eufive_20211110-062541

    • Size

      675KB

    • MD5

      acd893528dcd666797b377b94770feab

    • SHA1

      ccab720929ca7ab29257a9c9082109bae5dca644

    • SHA256

      3ca8306765d8e7196285df3a004eebf2b8cae24b1ed7cbd3d454c7a3253b59c2

    • SHA512

      15c1f1b330a523161995139941f3cb33315f6f6d6675da966138b4408bee32bf604fd8e630cf1e9d852ba23e44b455e374c1f29350eb1b4b63a752e8db9cb514

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Tasks