General

  • Target

    377905232b3368e37412883e9103b01b63c4845977c02a3c99f14be2f85d92c1

  • Size

    797KB

  • Sample

    220524-a94ceaagh8

  • MD5

    3a4f43491ddd022ab7e01519a5ed8943

  • SHA1

    0166b01cb32ca9f0e3d3fa4f219c3b311cf95866

  • SHA256

    377905232b3368e37412883e9103b01b63c4845977c02a3c99f14be2f85d92c1

  • SHA512

    55348b4108dfe6fdde451180f229338b9f71bea665db74be71b28332992082741d6cd3a8886114b70ba16cef1a8c9f98a2d2af888cdfa7fce784da8f06194b8b

Malware Config

Extracted

Family

vidar

Version

52.1

Botnet

517

C2

https://t.me/verstappenf1r

https://climatejustice.social/@ronxik312

Attributes
  • profile_id

    517

Targets

    • Target

      377905232b3368e37412883e9103b01b63c4845977c02a3c99f14be2f85d92c1

    • Size

      797KB

    • MD5

      3a4f43491ddd022ab7e01519a5ed8943

    • SHA1

      0166b01cb32ca9f0e3d3fa4f219c3b311cf95866

    • SHA256

      377905232b3368e37412883e9103b01b63c4845977c02a3c99f14be2f85d92c1

    • SHA512

      55348b4108dfe6fdde451180f229338b9f71bea665db74be71b28332992082741d6cd3a8886114b70ba16cef1a8c9f98a2d2af888cdfa7fce784da8f06194b8b

    • Djvu Ransomware

      Ransomware which is a variant of the STOP family.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request

      suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request

    • suricata: ET MALWARE Win32/Filecoder.STOP Variant Public Key Download

      suricata: ET MALWARE Win32/Filecoder.STOP Variant Public Key Download

    • suricata: ET MALWARE Win32/Filecoder.STOP Variant Request for Public Key

      suricata: ET MALWARE Win32/Filecoder.STOP Variant Request for Public Key

    • suricata: ET MALWARE Win32/Vodkagats Loader Requesting Payload

      suricata: ET MALWARE Win32/Vodkagats Loader Requesting Payload

    • Vidar Stealer

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies file permissions

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks