General

  • Target

    eufive_20211226-123859

  • Size

    758KB

  • Sample

    211226-trqs5sbfc9

  • MD5

    42a90c72d6963d276451e99ae8e4325f

  • SHA1

    536a63d79e58b92ebed3b1f76dfa62f79d380b47

  • SHA256

    a803d59ad9568b17c5a68afcd8d255e45097c5d542319b2111d9db10c7fd9350

  • SHA512

    e897c35613c7d444610e32940663bff6e8af6ebfbfe17d0def049305ce7f1271228753aca22cbb888e3d64c69e8d5bd7155b7265c772c0f6c04f217e71d8cdc0

Malware Config

Extracted

Family

vidar

Version

49.2

Botnet

818

C2

https://mstdn.social/@kipriauk9

https://qoto.org/@kipriauk8

Attributes
  • profile_id

    818

Targets

    • Target

      eufive_20211226-123859

    • Size

      758KB

    • MD5

      42a90c72d6963d276451e99ae8e4325f

    • SHA1

      536a63d79e58b92ebed3b1f76dfa62f79d380b47

    • SHA256

      a803d59ad9568b17c5a68afcd8d255e45097c5d542319b2111d9db10c7fd9350

    • SHA512

      e897c35613c7d444610e32940663bff6e8af6ebfbfe17d0def049305ce7f1271228753aca22cbb888e3d64c69e8d5bd7155b7265c772c0f6c04f217e71d8cdc0

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Tasks