General

  • Target

    d5a26234e372c9a32c304821f7a4084135c47ffbda225c5025d091623c4fd1be

  • Size

    2.4MB

  • Sample

    220610-ja8yaaggar

  • MD5

    b0b6b154c4d051aad99d04e3f18a3eb2

  • SHA1

    de8bf7682cd992ae63aeb093a3c45b2318f8b5fa

  • SHA256

    d5a26234e372c9a32c304821f7a4084135c47ffbda225c5025d091623c4fd1be

  • SHA512

    3ed5f2c3bfb66bc959487b515292b3857613d128d20bc914335c099cc6deaa93206f7c2e5be5f961555014b09c015b59102f3fb0315b1bc8d32449e1c363e253

Malware Config

Extracted

Family

vidar

Version

52.5

Botnet

1438

C2

https://t.me/tg_randomacc

https://indieweb.social/@ronxik333

Attributes
  • profile_id

    1438

Targets

    • Target

      d5a26234e372c9a32c304821f7a4084135c47ffbda225c5025d091623c4fd1be

    • Size

      2.4MB

    • MD5

      b0b6b154c4d051aad99d04e3f18a3eb2

    • SHA1

      de8bf7682cd992ae63aeb093a3c45b2318f8b5fa

    • SHA256

      d5a26234e372c9a32c304821f7a4084135c47ffbda225c5025d091623c4fd1be

    • SHA512

      3ed5f2c3bfb66bc959487b515292b3857613d128d20bc914335c099cc6deaa93206f7c2e5be5f961555014b09c015b59102f3fb0315b1bc8d32449e1c363e253

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

      suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

    • suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

      suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

    • Vidar Stealer

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Modifies file permissions

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

File Permissions Modification

1
T1222

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

3
T1005

Command and Control

Web Service

1
T1102

Tasks