General

  • Target

    cba4bf2713f913043fd6aa5990aa937a470f48c11c3d0361fe1cb951d6a74c76

  • Size

    764KB

  • Sample

    220215-gtvhwsbfa5

  • MD5

    6803564f8d27498decae376b90142e4f

  • SHA1

    41faef623fe7f6eaf120ac22d66e7c6fc1779db4

  • SHA256

    cba4bf2713f913043fd6aa5990aa937a470f48c11c3d0361fe1cb951d6a74c76

  • SHA512

    79b3e8eaa9539995738b281c842861f118e85449094ef8d8a7e5c4774bba1a3cfadc27fc88353b3411acbbef8780c7a0348545844d461e94751aed4ade8f3f29

Score
10/10

Malware Config

Extracted

Family

vidar

Version

48.2

Botnet

937

C2

https://koyu.space/@qmashton

Attributes
  • profile_id

    937

Targets

    • Target

      cba4bf2713f913043fd6aa5990aa937a470f48c11c3d0361fe1cb951d6a74c76

    • Size

      764KB

    • MD5

      6803564f8d27498decae376b90142e4f

    • SHA1

      41faef623fe7f6eaf120ac22d66e7c6fc1779db4

    • SHA256

      cba4bf2713f913043fd6aa5990aa937a470f48c11c3d0361fe1cb951d6a74c76

    • SHA512

      79b3e8eaa9539995738b281c842861f118e85449094ef8d8a7e5c4774bba1a3cfadc27fc88353b3411acbbef8780c7a0348545844d461e94751aed4ade8f3f29

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks