General

  • Target

    33ac0ea43c425209053f9360bd243e68deca0eb5cb4e638c6da557eb36f78935

  • Size

    597KB

  • Sample

    220303-d4tskahba6

  • MD5

    6cd2a1ef915859f2e6cfaddfcc876c98

  • SHA1

    9c8975025e9553c08546695b98e8b6987251def2

  • SHA256

    33ac0ea43c425209053f9360bd243e68deca0eb5cb4e638c6da557eb36f78935

  • SHA512

    7862d7cda69e3d2c820551214caa24b96148863c3139af0406b953820554886d29741f15a4a81945e22f79039824f56c52ece0e43a55eefcca755a6cd6502a05

Malware Config

Extracted

Family

vidar

Version

50.4

Botnet

565

C2

https://mastodon.online/@samsa11

https://koyu.space/@samsa2l

Attributes
  • profile_id

    565

Targets

    • Target

      33ac0ea43c425209053f9360bd243e68deca0eb5cb4e638c6da557eb36f78935

    • Size

      597KB

    • MD5

      6cd2a1ef915859f2e6cfaddfcc876c98

    • SHA1

      9c8975025e9553c08546695b98e8b6987251def2

    • SHA256

      33ac0ea43c425209053f9360bd243e68deca0eb5cb4e638c6da557eb36f78935

    • SHA512

      7862d7cda69e3d2c820551214caa24b96148863c3139af0406b953820554886d29741f15a4a81945e22f79039824f56c52ece0e43a55eefcca755a6cd6502a05

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

3
T1005

Tasks