General

  • Target

    2335b8319552c730f82387c7863ca05a.exe

  • Size

    612KB

  • Sample

    220301-jfayfaadeq

  • MD5

    2335b8319552c730f82387c7863ca05a

  • SHA1

    ed19f55576184707091b1d54340d2a33f360a193

  • SHA256

    a857b02662fd0cc423a8dc4213dca0167ff87f303190bf329213a1d9ee246069

  • SHA512

    7ca5fbc12d6ced98770d13326095c7671aa419f750662c47cd2e9a83052acff2d6aecf4b30cc593220813e93b7a66946efdc889af2e34c4d0d77c29f835896fc

Malware Config

Extracted

Family

vidar

Version

50.3

Botnet

1002

C2

https://mastodon.social/@kill5rnax

https://noc.social/@kill6nix

Attributes
  • profile_id

    1002

Targets

    • Target

      2335b8319552c730f82387c7863ca05a.exe

    • Size

      612KB

    • MD5

      2335b8319552c730f82387c7863ca05a

    • SHA1

      ed19f55576184707091b1d54340d2a33f360a193

    • SHA256

      a857b02662fd0cc423a8dc4213dca0167ff87f303190bf329213a1d9ee246069

    • SHA512

      7ca5fbc12d6ced98770d13326095c7671aa419f750662c47cd2e9a83052acff2d6aecf4b30cc593220813e93b7a66946efdc889af2e34c4d0d77c29f835896fc

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

      suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

    • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2

      suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2

    • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2

      suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2

    • suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

      suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

    • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

      suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

    • Vidar Stealer

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

3
T1005

Tasks