General

  • Target

    9356506457dc510ea9bb2743be661106573beb605dc6127bbf0a82b524eb8c88

  • Size

    3.6MB

  • Sample

    220215-jya16aceg8

  • MD5

    81a66564a1a5c2c2b7189681326804aa

  • SHA1

    ac5e9117eea3f03baaf261125492610ec0bbdeb8

  • SHA256

    9356506457dc510ea9bb2743be661106573beb605dc6127bbf0a82b524eb8c88

  • SHA512

    e445e8a7f61353036ffb8c0b38efb5945411b6c7ff58f7920aa6b9328616da5f1fc87894c6ddf301eaec1226c5ca766d7aaabe3bbe7de4fb6a0a3356e8b513ec

Malware Config

Extracted

Family

vidar

Version

48.1

Botnet

932

C2

https://koyu.space/@rspich

Attributes
  • profile_id

    932

Targets

    • Target

      9356506457dc510ea9bb2743be661106573beb605dc6127bbf0a82b524eb8c88

    • Size

      3.6MB

    • MD5

      81a66564a1a5c2c2b7189681326804aa

    • SHA1

      ac5e9117eea3f03baaf261125492610ec0bbdeb8

    • SHA256

      9356506457dc510ea9bb2743be661106573beb605dc6127bbf0a82b524eb8c88

    • SHA512

      e445e8a7f61353036ffb8c0b38efb5945411b6c7ff58f7920aa6b9328616da5f1fc87894c6ddf301eaec1226c5ca766d7aaabe3bbe7de4fb6a0a3356e8b513ec

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks