General

  • Target

    e19e5702b706ca6a9508d67a44379aaef9361111dcdcd99c65fac6e027534fa7

  • Size

    721KB

  • Sample

    220215-f2b6vacfcr

  • MD5

    5aae43957aac87119b0c3b3f75238f5f

  • SHA1

    6c3d927fb44f0afab6b8ab0130e47ba0b143f8b6

  • SHA256

    e19e5702b706ca6a9508d67a44379aaef9361111dcdcd99c65fac6e027534fa7

  • SHA512

    29775313ba24ce6c79f7f35ff3e71664211fea86887947307774bf9113acd6a0bbe2c69f86bf379cf6aac41746098e9002e77aaf61983157088e48528979ff34

Score
10/10

Malware Config

Extracted

Family

vidar

Version

47.8

Botnet

937

C2

https://mas.to/@romashkin

Attributes
  • profile_id

    937

Targets

    • Target

      e19e5702b706ca6a9508d67a44379aaef9361111dcdcd99c65fac6e027534fa7

    • Size

      721KB

    • MD5

      5aae43957aac87119b0c3b3f75238f5f

    • SHA1

      6c3d927fb44f0afab6b8ab0130e47ba0b143f8b6

    • SHA256

      e19e5702b706ca6a9508d67a44379aaef9361111dcdcd99c65fac6e027534fa7

    • SHA512

      29775313ba24ce6c79f7f35ff3e71664211fea86887947307774bf9113acd6a0bbe2c69f86bf379cf6aac41746098e9002e77aaf61983157088e48528979ff34

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks