General

  • Target

    5c70ffeb20cdc84912083b9ce5c28a7eb1912087e661a50585b076afe0f94a5a

  • Size

    2.1MB

  • Sample

    220106-dgc7asahg3

  • MD5

    0604f2c825588283ebaef9f57c97d196

  • SHA1

    3bd5ce1121556f136006d279acd5f363448e65dc

  • SHA256

    5c70ffeb20cdc84912083b9ce5c28a7eb1912087e661a50585b076afe0f94a5a

  • SHA512

    76a6a8b24ee2bb2ab6fa1330ea70f0ddc377aae5ecb1d8f30894b96b5f40671b455fef6055c6a5888f02e84e175cf3064626d4e41d2945752f7810baf21a6b2e

Malware Config

Extracted

Family

vidar

Version

49.2

Botnet

869

C2

https://mstdn.social/@kipriauk9

https://qoto.org/@kipriauk8

Attributes
  • profile_id

    869

Targets

    • Target

      5c70ffeb20cdc84912083b9ce5c28a7eb1912087e661a50585b076afe0f94a5a

    • Size

      2.1MB

    • MD5

      0604f2c825588283ebaef9f57c97d196

    • SHA1

      3bd5ce1121556f136006d279acd5f363448e65dc

    • SHA256

      5c70ffeb20cdc84912083b9ce5c28a7eb1912087e661a50585b076afe0f94a5a

    • SHA512

      76a6a8b24ee2bb2ab6fa1330ea70f0ddc377aae5ecb1d8f30894b96b5f40671b455fef6055c6a5888f02e84e175cf3064626d4e41d2945752f7810baf21a6b2e

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks