General

  • Target

    c37ab7fc4b65b54fcb9c3c6493a94ae57e32b6a9fe2c6b61f835e7c5aed744dc

  • Size

    1.5MB

  • Sample

    220520-hpsdeaefg2

  • MD5

    879bdb1fc2d0cbb8f7882345063f045c

  • SHA1

    d2f59f783b1126df4b3c1d5f70ad7b173685a02f

  • SHA256

    c37ab7fc4b65b54fcb9c3c6493a94ae57e32b6a9fe2c6b61f835e7c5aed744dc

  • SHA512

    aaa8c62adb2a72a64b349b5b03cb55a1d5dde10419ad372808235191a8e1a726fec71f11b4fcc235a65e43bd7e413139585ac2dbe43f5c3ee21639768ae27eba

Malware Config

Extracted

Family

vidar

Version

52.2

Botnet

1326

C2

https://t.me/netflixaccsfree

https://mastodon.social/@ronxik12

Attributes
  • profile_id

    1326

Targets

    • Target

      c37ab7fc4b65b54fcb9c3c6493a94ae57e32b6a9fe2c6b61f835e7c5aed744dc

    • Size

      1.5MB

    • MD5

      879bdb1fc2d0cbb8f7882345063f045c

    • SHA1

      d2f59f783b1126df4b3c1d5f70ad7b173685a02f

    • SHA256

      c37ab7fc4b65b54fcb9c3c6493a94ae57e32b6a9fe2c6b61f835e7c5aed744dc

    • SHA512

      aaa8c62adb2a72a64b349b5b03cb55a1d5dde10419ad372808235191a8e1a726fec71f11b4fcc235a65e43bd7e413139585ac2dbe43f5c3ee21639768ae27eba

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

      suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

    • suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

      suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

    • Vidar Stealer

    • Loads dropped DLL

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks