General

  • Target

    1D30.bin.zip

  • Size

    231KB

  • Sample

    220516-rb3rnagabr

  • MD5

    dd4b25af4110a573f5c2397ee44a7cee

  • SHA1

    a104d3322e04a6412afaf6918ede73ff7257647d

  • SHA256

    3410cc6e8f02ca9b276714082ebddd2d34e750645741ae228351aff7d43c55d4

  • SHA512

    0fec2035346add404b7fdb771a6d313ba459a7b54195cab200773247334950a6ed1bcac3c5fcad21ed33290fe92161ad9c7da40c7fa3f85213342c942141b87e

Malware Config

Extracted

Family

vidar

Version

52.1

Botnet

937

C2

https://t.me/verstappenf1r

https://climatejustice.social/@ronxik312

Attributes
  • profile_id

    937

Targets

    • Target

      1D30.bin

    • Size

      360KB

    • MD5

      64c1336fcfe148773b61a2fc1f9384ce

    • SHA1

      deb9ccd967564d2210634bfed1cd3ac53c3c12f5

    • SHA256

      fd594ed8a9739eb4b729de2eeb89cbe5d41f4ed0869ead5105a7caa880077803

    • SHA512

      e7b5ce208e31a2e94c8c87b6f46c7597934d9828b1d4967398be2b7c44a3c158a09b4c1ae34bb48d06781f7249b180e413c6b0ef7744af6153b29f8288bad4f7

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

      suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

    • suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

      suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

    • Vidar Stealer

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Tasks