General

  • Target

    2f17c87776c24df1bac5b312c3dfbd31b61637d7191a2522026c47f78efc5795

  • Size

    478KB

  • Sample

    220531-l7c8zsahd2

  • MD5

    a4155a9ac86e67f1abe1caa06ad09922

  • SHA1

    12d89a80bf4ffe6422187723739b88ea7d2d3573

  • SHA256

    2f17c87776c24df1bac5b312c3dfbd31b61637d7191a2522026c47f78efc5795

  • SHA512

    7aab92b5cf446f7d31dab6ad0ec6ed1bdaaec7e485c4509da95c606d602610986cce8cc15dbbd4a9057f600c0d33376535016c70670ab4bb4ca435875f407715

Malware Config

Extracted

Family

vidar

Version

52.4

Botnet

1366

C2

https://t.me/foreigndocs

https://c.im/@ronxik31

Attributes
  • profile_id

    1366

Targets

    • Target

      2f17c87776c24df1bac5b312c3dfbd31b61637d7191a2522026c47f78efc5795

    • Size

      478KB

    • MD5

      a4155a9ac86e67f1abe1caa06ad09922

    • SHA1

      12d89a80bf4ffe6422187723739b88ea7d2d3573

    • SHA256

      2f17c87776c24df1bac5b312c3dfbd31b61637d7191a2522026c47f78efc5795

    • SHA512

      7aab92b5cf446f7d31dab6ad0ec6ed1bdaaec7e485c4509da95c606d602610986cce8cc15dbbd4a9057f600c0d33376535016c70670ab4bb4ca435875f407715

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

      suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

    • suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

      suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

    • Vidar Stealer

    • Loads dropped DLL

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks