General

  • Target

    tmp

  • Size

    377KB

  • Sample

    220512-fnk7laaee3

  • MD5

    3f731ba712e3a286bf832c4c0a20c6c0

  • SHA1

    1a70ef68a6d1b7a7a8d3db6a19ce996ca19d4bf2

  • SHA256

    36bccef36152628ba35e82a3bb798086f1b46118f9085834029f17a494c2c8df

  • SHA512

    f7be97a3ac7ad8fe6be0f70863f25d53a1d4e4ff12fd289358ff448a598507cbf784bfe3f23f03a014756cf31f237fd705374c3eeb1af7fc2a479433249f636d

Malware Config

Extracted

Family

vidar

Version

52.1

Botnet

1364

C2

https://t.me/verstappenf1r

https://climatejustice.social/@ronxik312

Attributes
  • profile_id

    1364

Targets

    • Target

      tmp

    • Size

      377KB

    • MD5

      3f731ba712e3a286bf832c4c0a20c6c0

    • SHA1

      1a70ef68a6d1b7a7a8d3db6a19ce996ca19d4bf2

    • SHA256

      36bccef36152628ba35e82a3bb798086f1b46118f9085834029f17a494c2c8df

    • SHA512

      f7be97a3ac7ad8fe6be0f70863f25d53a1d4e4ff12fd289358ff448a598507cbf784bfe3f23f03a014756cf31f237fd705374c3eeb1af7fc2a479433249f636d

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

      suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

    • suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

      suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

    • Vidar Stealer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

3
T1005

Tasks