General

  • Target

    d41c3b72a7759a814becaa2a49e3290ee6cd957da85a300e37c48658e3ad1989

  • Size

    8KB

  • Sample

    220319-nxm2jshban

  • MD5

    8e0cb3ec8385850c7dae3859e3e16cc9

  • SHA1

    f199182de1a4eabac1cecb49687c579bac783b6b

  • SHA256

    d41c3b72a7759a814becaa2a49e3290ee6cd957da85a300e37c48658e3ad1989

  • SHA512

    97a4065ce4a0e42cd3299209cfa48e0dbf0da0715ff4ddff70dda9c38e31c6597210a7fa1c4e52ca8efbd0f9da7afeab2e91f85ce5ae930f6bd19e05d0cd3889

Malware Config

Extracted

Family

vidar

Version

48.7

Botnet

933

C2

https://mstdn.social/@anapa

https://mastodon.social/@mniami

Attributes
  • profile_id

    933

Targets

    • Target

      d41c3b72a7759a814becaa2a49e3290ee6cd957da85a300e37c48658e3ad1989

    • Size

      8KB

    • MD5

      8e0cb3ec8385850c7dae3859e3e16cc9

    • SHA1

      f199182de1a4eabac1cecb49687c579bac783b6b

    • SHA256

      d41c3b72a7759a814becaa2a49e3290ee6cd957da85a300e37c48658e3ad1989

    • SHA512

      97a4065ce4a0e42cd3299209cfa48e0dbf0da0715ff4ddff70dda9c38e31c6597210a7fa1c4e52ca8efbd0f9da7afeab2e91f85ce5ae930f6bd19e05d0cd3889

    • OnlyLogger

      A tiny loader that uses IPLogger to get its payload.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • OnlyLogger Payload

    • Vidar Stealer

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks