General

  • Target

    f580adea9d3858c84ea8d5110ec61df73395dedb05b8e5dae7f979de81569af2

  • Size

    400KB

  • Sample

    220619-w1s1zaagd6

  • MD5

    f0c7044239cc79a018a3fd2a8c76ccc9

  • SHA1

    3f6d46e3d06cff33b5ea0e815148042b5c4dd6cf

  • SHA256

    f580adea9d3858c84ea8d5110ec61df73395dedb05b8e5dae7f979de81569af2

  • SHA512

    546a6ea3c149621bdb51b6f0c5e784b9b35a847352ea694da7060a50a1b6be3ec9f640684572c90cf5b2442829f8a751881cda18710cdab5cb49dfc05899817f

Malware Config

Extracted

Family

vidar

Version

52.6

Botnet

937

C2

https://t.me/tg_dailylessons

https://busshi.moe/@olegf9844xx

Attributes
  • profile_id

    937

Targets

    • Target

      f580adea9d3858c84ea8d5110ec61df73395dedb05b8e5dae7f979de81569af2

    • Size

      400KB

    • MD5

      f0c7044239cc79a018a3fd2a8c76ccc9

    • SHA1

      3f6d46e3d06cff33b5ea0e815148042b5c4dd6cf

    • SHA256

      f580adea9d3858c84ea8d5110ec61df73395dedb05b8e5dae7f979de81569af2

    • SHA512

      546a6ea3c149621bdb51b6f0c5e784b9b35a847352ea694da7060a50a1b6be3ec9f640684572c90cf5b2442829f8a751881cda18710cdab5cb49dfc05899817f

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

      suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

    • suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

      suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

    • Vidar Stealer

    • Deletes itself

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

4
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

4
T1005

Tasks