General

  • Target

    a09d8cb46f97dd7c87a4bef6b13793715fb8ac580f060f169ff3a3db1d01e633

  • Size

    534KB

  • Sample

    220303-kacqhsaaa3

  • MD5

    e9eaec65507554ab122d1bd4c971eea2

  • SHA1

    242d5feb2dd07c4f3affde6b57019f6c4a2eef41

  • SHA256

    5386a1b632b8f7af64c1b993b4e19bef25000f74f904b36ae1abc6e238a30c92

  • SHA512

    c7b837de150d47b9d77a9fb7418756c4716b8eac875dea3dff81a94740cae6de7be6588958f5ff660258945abad03453259a8abee2fd8d95f6db41354ce64bbb

Malware Config

Extracted

Family

vidar

Version

50.3

Botnet

565

C2

https://mastodon.social/@kill5rnax

https://noc.social/@kill6nix

Attributes
  • profile_id

    565

Targets

    • Target

      a09d8cb46f97dd7c87a4bef6b13793715fb8ac580f060f169ff3a3db1d01e633

    • Size

      678KB

    • MD5

      472b6f1cb5429913d7391bdb34e95640

    • SHA1

      fcae185f1b9bc48dd55f637125413deffd31ee14

    • SHA256

      a09d8cb46f97dd7c87a4bef6b13793715fb8ac580f060f169ff3a3db1d01e633

    • SHA512

      ce2c9bdea3225e428e2521a4d72c53f4f4251db47174e917698488e5ed9d7322e320f56681779c6e5861ea78f582169973cbb1d5d5e6bc0a61fb93f83ce3170f

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

3
T1005

Tasks