General

  • Target

    b77f8d508fad02062c59d0392396cbb2b5454851a2fe790690c3d6690ece9463

  • Size

    429KB

  • Sample

    220623-s434kagee2

  • MD5

    7a088b54a6383895f1316f0a3a7199ad

  • SHA1

    522b555d1bfbffc945ba85171f705dca18aac5ec

  • SHA256

    b77f8d508fad02062c59d0392396cbb2b5454851a2fe790690c3d6690ece9463

  • SHA512

    50d5d82e9e35581ca2247496b6e7ba6e5b7564a831f8a7ea76c8d87e544301113b23a82d2ee370656ecd9a9698cad6527457fa9426a55209ff778f169efb5235

Malware Config

Extracted

Family

vidar

Version

52.7

Botnet

1448

C2

https://t.me/tg_superch

https://climatejustice.social/@olegf9844

Attributes
  • profile_id

    1448

Extracted

Family

amadey

Version

3.21

C2

185.215.113.15/Lkb2dxj3/index.php

Targets

    • Target

      b77f8d508fad02062c59d0392396cbb2b5454851a2fe790690c3d6690ece9463

    • Size

      429KB

    • MD5

      7a088b54a6383895f1316f0a3a7199ad

    • SHA1

      522b555d1bfbffc945ba85171f705dca18aac5ec

    • SHA256

      b77f8d508fad02062c59d0392396cbb2b5454851a2fe790690c3d6690ece9463

    • SHA512

      50d5d82e9e35581ca2247496b6e7ba6e5b7564a831f8a7ea76c8d87e544301113b23a82d2ee370656ecd9a9698cad6527457fa9426a55209ff778f169efb5235

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • suricata: ET MALWARE Amadey CnC Check-In

      suricata: ET MALWARE Amadey CnC Check-In

    • suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

      suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

    • suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

      suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

    • Vidar Stealer

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

4
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

4
T1005

Email Collection

1
T1114

Tasks