General

  • Target

    6f20e8f1b4514204c76ee6ac5fccf35e637546bdd9f8739b709d66dd3748e3c6

  • Size

    628KB

  • Sample

    220215-pmrgnagbak

  • MD5

    761674fa96c65b579d2918c740712e19

  • SHA1

    ff96a97efdd1e9bc2c1c8ae5a6650fbf314b79bb

  • SHA256

    6f20e8f1b4514204c76ee6ac5fccf35e637546bdd9f8739b709d66dd3748e3c6

  • SHA512

    68ad01b44293b2380f1a0560ccbf53b06d82bd526a3c5179ce9697a24331159810380606ee9a51706abac076d3a7dce7c7de7943ac076372c1613f17a22c63a2

Score
10/10

Malware Config

Extracted

Family

vidar

Version

48.2

Botnet

933

C2

https://koyu.space/@qmashton

Attributes
  • profile_id

    933

Targets

    • Target

      6f20e8f1b4514204c76ee6ac5fccf35e637546bdd9f8739b709d66dd3748e3c6

    • Size

      628KB

    • MD5

      761674fa96c65b579d2918c740712e19

    • SHA1

      ff96a97efdd1e9bc2c1c8ae5a6650fbf314b79bb

    • SHA256

      6f20e8f1b4514204c76ee6ac5fccf35e637546bdd9f8739b709d66dd3748e3c6

    • SHA512

      68ad01b44293b2380f1a0560ccbf53b06d82bd526a3c5179ce9697a24331159810380606ee9a51706abac076d3a7dce7c7de7943ac076372c1613f17a22c63a2

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks