General

  • Target

    9dbeccbbcd59bd80f7e9a01878e334af6df9b767298eb029f5cb82b1283f51d3

  • Size

    2.2MB

  • Sample

    211117-lb4q3aehak

  • MD5

    2b08729f793ba8efccff549b500432e4

  • SHA1

    61d83dfab504c1d9698922d57ddcf7295899ae86

  • SHA256

    9dbeccbbcd59bd80f7e9a01878e334af6df9b767298eb029f5cb82b1283f51d3

  • SHA512

    1657d8c63b1c07c12825a66e2f317e89e48956d067a69d1561d45ffd201af054cb1cd98d30a3086b6ad8aeef8d13b771581d6fcdaac347c0f40fdbceb3f4aadb

Malware Config

Extracted

Family

vidar

Version

48.6

Botnet

869

C2

https://mastodon.online/@valhalla

https://koyu.space/@valhalla

Attributes
  • profile_id

    869

Targets

    • Target

      9dbeccbbcd59bd80f7e9a01878e334af6df9b767298eb029f5cb82b1283f51d3

    • Size

      2.2MB

    • MD5

      2b08729f793ba8efccff549b500432e4

    • SHA1

      61d83dfab504c1d9698922d57ddcf7295899ae86

    • SHA256

      9dbeccbbcd59bd80f7e9a01878e334af6df9b767298eb029f5cb82b1283f51d3

    • SHA512

      1657d8c63b1c07c12825a66e2f317e89e48956d067a69d1561d45ffd201af054cb1cd98d30a3086b6ad8aeef8d13b771581d6fcdaac347c0f40fdbceb3f4aadb

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

      suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

    • suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

      suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks