Analysis

  • max time kernel
    97s
  • max time network
    164s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    28-05-2022 05:21

General

  • Target

    024b3508e9c9013bc2c8f6f6b81441677cbedabad91ec6c545ef6deee6799eb8.exe

  • Size

    694KB

  • MD5

    4d0196fa739c1085b438da322c97390f

  • SHA1

    e39239052213e842d4fdccbbe6ad4afd9fce2788

  • SHA256

    024b3508e9c9013bc2c8f6f6b81441677cbedabad91ec6c545ef6deee6799eb8

  • SHA512

    d7f1adcaf1493817bb3d48e1a4cd499fe8871ba289b8a3ac3265c65d3f45c47055fcfc08e32e77027301b0f5e7c2557358898a626b38181cd5def04ee8dfb288

Score
10/10

Malware Config

Extracted

Family

vidar

Version

41.5

Botnet

933

C2

https://mas.to/@xeroxxx

Attributes
  • profile_id

    933

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 3 IoCs
  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\024b3508e9c9013bc2c8f6f6b81441677cbedabad91ec6c545ef6deee6799eb8.exe
    "C:\Users\Admin\AppData\Local\Temp\024b3508e9c9013bc2c8f6f6b81441677cbedabad91ec6c545ef6deee6799eb8.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 1360
      2⤵
      • Program crash
      PID:652

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/652-59-0x0000000000000000-mapping.dmp
  • memory/1628-54-0x0000000075EF1000-0x0000000075EF3000-memory.dmp
    Filesize

    8KB

  • memory/1628-55-0x0000000000220000-0x000000000029C000-memory.dmp
    Filesize

    496KB

  • memory/1628-56-0x00000000047B0000-0x0000000004886000-memory.dmp
    Filesize

    856KB

  • memory/1628-57-0x0000000000400000-0x0000000002F74000-memory.dmp
    Filesize

    43.5MB

  • memory/1628-58-0x0000000000400000-0x0000000002F74000-memory.dmp
    Filesize

    43.5MB