General

  • Target

    c24966e960c50eef8f024a3181e312b2c99bc05e516262a284370893b8e8973d

  • Size

    394KB

  • Sample

    220705-j8lweahcg3

  • MD5

    ae80ca8a75a4e4c689ef5bb817db0bb1

  • SHA1

    f44e95d11cada37f845f30f5dda54cd00d15870f

  • SHA256

    c24966e960c50eef8f024a3181e312b2c99bc05e516262a284370893b8e8973d

  • SHA512

    4079f4780fef95260b8895e9995c0dc734be4f10624aa5f3435e3a9c4cef4cd376a1cdad4c5609c2e16201f3a7ca1b7c3b945c5f2b1f51c01dbba98c8f5f5866

Malware Config

Extracted

Family

vidar

Version

53.1

Botnet

1519

C2

https://t.me/tg_dailyrunnings

https://mastodon.online/@olegf9844g

Attributes
  • profile_id

    1519

Targets

    • Target

      c24966e960c50eef8f024a3181e312b2c99bc05e516262a284370893b8e8973d

    • Size

      394KB

    • MD5

      ae80ca8a75a4e4c689ef5bb817db0bb1

    • SHA1

      f44e95d11cada37f845f30f5dda54cd00d15870f

    • SHA256

      c24966e960c50eef8f024a3181e312b2c99bc05e516262a284370893b8e8973d

    • SHA512

      4079f4780fef95260b8895e9995c0dc734be4f10624aa5f3435e3a9c4cef4cd376a1cdad4c5609c2e16201f3a7ca1b7c3b945c5f2b1f51c01dbba98c8f5f5866

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

      suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

    • Vidar Stealer

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks