General

  • Target

    04927fb6b7abf7ff94b7b5f3ae72a3745d19e6e7088763e3e121b9f54a5d905c

  • Size

    679KB

  • Sample

    220215-te6zlagga3

  • MD5

    8e998231db502501ae9d1340717c5e93

  • SHA1

    852e491a3a3e61e5fa85927c7cb39c1618f61e0c

  • SHA256

    04927fb6b7abf7ff94b7b5f3ae72a3745d19e6e7088763e3e121b9f54a5d905c

  • SHA512

    b8a2beffcc5a7cdf6e4b2ce91de592a97cef45f6813198e457c979f57949276d8aa1b4077243d064c00913c900c8ff3c5c27abb199bc9f9941eee4ce9ac9a8d8

Score
10/10

Malware Config

Extracted

Family

vidar

Version

48.5

Botnet

937

C2

https://koyu.space/@tttaj

Attributes
  • profile_id

    937

Targets

    • Target

      04927fb6b7abf7ff94b7b5f3ae72a3745d19e6e7088763e3e121b9f54a5d905c

    • Size

      679KB

    • MD5

      8e998231db502501ae9d1340717c5e93

    • SHA1

      852e491a3a3e61e5fa85927c7cb39c1618f61e0c

    • SHA256

      04927fb6b7abf7ff94b7b5f3ae72a3745d19e6e7088763e3e121b9f54a5d905c

    • SHA512

      b8a2beffcc5a7cdf6e4b2ce91de592a97cef45f6813198e457c979f57949276d8aa1b4077243d064c00913c900c8ff3c5c27abb199bc9f9941eee4ce9ac9a8d8

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks