General

  • Target

    38d54d276dafe59385a4bdddd8dbef6a5cdfc7afbe75e275ff613274f103afaf

  • Size

    399KB

  • Sample

    220519-17f27sfben

  • MD5

    89d2c921a6cae15b55e162f8ca73e992

  • SHA1

    0bc50a2a1b28ddfdba49fa773a8587019aa74144

  • SHA256

    38d54d276dafe59385a4bdddd8dbef6a5cdfc7afbe75e275ff613274f103afaf

  • SHA512

    349c7c7b5b28103118e90d3a0819f6e4fbdaf019eb0939333643354ae9110689288da95a8a57f8ab90ff09d567ed189710a194f8e7a9bb62a7a373f51564ed56

Malware Config

Extracted

Family

vidar

Version

52.2

Botnet

1376

C2

https://t.me/netflixaccsfree

https://mastodon.social/@ronxik12

Attributes
  • profile_id

    1376

Targets

    • Target

      38d54d276dafe59385a4bdddd8dbef6a5cdfc7afbe75e275ff613274f103afaf

    • Size

      399KB

    • MD5

      89d2c921a6cae15b55e162f8ca73e992

    • SHA1

      0bc50a2a1b28ddfdba49fa773a8587019aa74144

    • SHA256

      38d54d276dafe59385a4bdddd8dbef6a5cdfc7afbe75e275ff613274f103afaf

    • SHA512

      349c7c7b5b28103118e90d3a0819f6e4fbdaf019eb0939333643354ae9110689288da95a8a57f8ab90ff09d567ed189710a194f8e7a9bb62a7a373f51564ed56

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

      suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

    • suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

      suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

    • Vidar Stealer

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks