Analysis

  • max time kernel
    75s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    02-07-2022 21:06

General

  • Target

    b0788093ab423639aefac4eb31d8a2d1.exe

  • Size

    393KB

  • MD5

    b0788093ab423639aefac4eb31d8a2d1

  • SHA1

    35d5bfc9f3ff67a50558fccbe8b2c45eead03661

  • SHA256

    6e20db9320c1902cff4324891402a7ab38fdf118131c69a3e47578589efc130d

  • SHA512

    7cb35b890646e099fab47b1581e9c2acd5daae29e9b1788a1815496a51983aefacbad360be49be26cdc6787d36c9e5e2032b9571b5be3154ac1995ec456da758

Score
10/10

Malware Config

Extracted

Family

vidar

Version

53

Botnet

937

C2

https://t.me/ch_inagroup

https://mastodon.social/@olegf9844e

Attributes
  • profile_id

    937

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 2 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0788093ab423639aefac4eb31d8a2d1.exe
    "C:\Users\Admin\AppData\Local\Temp\b0788093ab423639aefac4eb31d8a2d1.exe"
    1⤵
    • Modifies system certificate store
    PID:852

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/852-55-0x0000000000230000-0x0000000000330000-memory.dmp
    Filesize

    1024KB

  • memory/852-56-0x00000000003B0000-0x00000000003FD000-memory.dmp
    Filesize

    308KB

  • memory/852-57-0x0000000000400000-0x0000000000B55000-memory.dmp
    Filesize

    7.3MB

  • memory/852-58-0x0000000000230000-0x0000000000330000-memory.dmp
    Filesize

    1024KB

  • memory/852-59-0x0000000076781000-0x0000000076783000-memory.dmp
    Filesize

    8KB