General

  • Target

    a09d8cb46f97dd7c87a4bef6b13793715fb8ac580f060f169ff3a3db1d01e633

  • Size

    678KB

  • Sample

    220227-pmcnhadedl

  • MD5

    472b6f1cb5429913d7391bdb34e95640

  • SHA1

    fcae185f1b9bc48dd55f637125413deffd31ee14

  • SHA256

    a09d8cb46f97dd7c87a4bef6b13793715fb8ac580f060f169ff3a3db1d01e633

  • SHA512

    ce2c9bdea3225e428e2521a4d72c53f4f4251db47174e917698488e5ed9d7322e320f56681779c6e5861ea78f582169973cbb1d5d5e6bc0a61fb93f83ce3170f

Malware Config

Extracted

Family

vidar

Version

50.3

Botnet

565

C2

https://mastodon.social/@kill5rnax

https://noc.social/@kill6nix

Attributes
  • profile_id

    565

Targets

    • Target

      a09d8cb46f97dd7c87a4bef6b13793715fb8ac580f060f169ff3a3db1d01e633

    • Size

      678KB

    • MD5

      472b6f1cb5429913d7391bdb34e95640

    • SHA1

      fcae185f1b9bc48dd55f637125413deffd31ee14

    • SHA256

      a09d8cb46f97dd7c87a4bef6b13793715fb8ac580f060f169ff3a3db1d01e633

    • SHA512

      ce2c9bdea3225e428e2521a4d72c53f4f4251db47174e917698488e5ed9d7322e320f56681779c6e5861ea78f582169973cbb1d5d5e6bc0a61fb93f83ce3170f

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

      suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

    • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2

      suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2

    • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2

      suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2

    • suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

      suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

    • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

      suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

    • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

      suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

    • Vidar Stealer

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

3
T1005

Tasks