General

  • Target

    b0788093ab423639aefac4eb31d8a2d1.exe

  • Size

    393KB

  • Sample

    220702-zxqcfshhgl

  • MD5

    b0788093ab423639aefac4eb31d8a2d1

  • SHA1

    35d5bfc9f3ff67a50558fccbe8b2c45eead03661

  • SHA256

    6e20db9320c1902cff4324891402a7ab38fdf118131c69a3e47578589efc130d

  • SHA512

    7cb35b890646e099fab47b1581e9c2acd5daae29e9b1788a1815496a51983aefacbad360be49be26cdc6787d36c9e5e2032b9571b5be3154ac1995ec456da758

Malware Config

Extracted

Family

vidar

Version

53

Botnet

937

C2

https://t.me/ch_inagroup

https://mastodon.social/@olegf9844e

Attributes
  • profile_id

    937

Targets

    • Target

      b0788093ab423639aefac4eb31d8a2d1.exe

    • Size

      393KB

    • MD5

      b0788093ab423639aefac4eb31d8a2d1

    • SHA1

      35d5bfc9f3ff67a50558fccbe8b2c45eead03661

    • SHA256

      6e20db9320c1902cff4324891402a7ab38fdf118131c69a3e47578589efc130d

    • SHA512

      7cb35b890646e099fab47b1581e9c2acd5daae29e9b1788a1815496a51983aefacbad360be49be26cdc6787d36c9e5e2032b9571b5be3154ac1995ec456da758

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

      suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

    • suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

      suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

    • Vidar Stealer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

3
T1005

Tasks