Analysis

  • max time kernel
    70s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    12-05-2022 07:33

General

  • Target

    3107999f9600f5f2bc88e17282da2773.exe

  • Size

    367KB

  • MD5

    3107999f9600f5f2bc88e17282da2773

  • SHA1

    8862f9551fdb7dc30e135c556751b973f441e7b4

  • SHA256

    aacab9cbbf292403a63bcfd1f6f0a9e534ac39aab406f2c9d7aa98b719f3801f

  • SHA512

    50c66565fc457b848014eaf70b3f7cc408e8a818bd29c80daf53597a44c182d26649c249a6e3fe7e6516fc7ff7e7026f3aff4b25ee48645789fa6cd3d3e2f338

Score
10/10

Malware Config

Extracted

Family

vidar

Version

52.1

Botnet

517

C2

https://t.me/verstappenf1r

https://climatejustice.social/@ronxik312

Attributes
  • profile_id

    517

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3107999f9600f5f2bc88e17282da2773.exe
    "C:\Users\Admin\AppData\Local\Temp\3107999f9600f5f2bc88e17282da2773.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:308
    • C:\Users\Admin\AppData\Local\Temp\3107999f9600f5f2bc88e17282da2773.exe
      "C:\Users\Admin\AppData\Local\Temp\3107999f9600f5f2bc88e17282da2773.exe"
      2⤵
      • Modifies system certificate store
      PID:552

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/308-56-0x000000000059A000-0x00000000005C4000-memory.dmp

    Filesize

    168KB

  • memory/308-58-0x0000000000220000-0x0000000000269000-memory.dmp

    Filesize

    292KB

  • memory/552-55-0x000000000042103C-mapping.dmp

  • memory/552-54-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/552-59-0x0000000075501000-0x0000000075503000-memory.dmp

    Filesize

    8KB

  • memory/552-60-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/552-61-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB