General

  • Target

    2f2e70b2e3f475b4376ec74974c740c4fcd5529fa5d345747b2a8ea794a10a64

  • Size

    1.2MB

  • Sample

    220621-3ebywsegar

  • MD5

    647b37e6a2b769bd27ff9bb8053010ab

  • SHA1

    296900eeed954a7a2ed8122f6e4ff7ced6c9f3bb

  • SHA256

    2f2e70b2e3f475b4376ec74974c740c4fcd5529fa5d345747b2a8ea794a10a64

  • SHA512

    414805edd356e21afd1fdfca68f8621d3bfb9eb65ba0b873c013bbcc2625ea3e0a71a8b0a59b49fd5825734605515751dff6eed785ec283a196b1c41e5917750

Malware Config

Extracted

Family

vidar

Version

16.9

Botnet

237

C2

http://travelquize.com/

Attributes
  • profile_id

    237

Targets

    • Target

      2f2e70b2e3f475b4376ec74974c740c4fcd5529fa5d345747b2a8ea794a10a64

    • Size

      1.2MB

    • MD5

      647b37e6a2b769bd27ff9bb8053010ab

    • SHA1

      296900eeed954a7a2ed8122f6e4ff7ced6c9f3bb

    • SHA256

      2f2e70b2e3f475b4376ec74974c740c4fcd5529fa5d345747b2a8ea794a10a64

    • SHA512

      414805edd356e21afd1fdfca68f8621d3bfb9eb65ba0b873c013bbcc2625ea3e0a71a8b0a59b49fd5825734605515751dff6eed785ec283a196b1c41e5917750

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

      suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

    • Vidar Stealer

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

4
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

4
T1005

Tasks