General

  • Target

    ac617646463d900c2513785e37290e01.exe

  • Size

    303KB

  • Sample

    220717-hv1a7sgeg6

  • MD5

    ac617646463d900c2513785e37290e01

  • SHA1

    5b6ec3318c82a7df78b9207bef7d45be2e470198

  • SHA256

    4f2696febfd29143776e40f478e9d1d9ee36d73cc662d4666cf065a077ee66fa

  • SHA512

    0666c74e079e14b11de185fa04b55123cd73e5e8be9662b768138e232d336d710ede147e63aa15c9754bed215822f8a6848f518f1391e6e80158c100cf6eabec

Malware Config

Extracted

Family

vidar

Version

53.2

Botnet

1415

C2

https://t.me/tgch_hijuly

https://c.im/@olegf9844h

Attributes
  • profile_id

    1415

Targets

    • Target

      ac617646463d900c2513785e37290e01.exe

    • Size

      303KB

    • MD5

      ac617646463d900c2513785e37290e01

    • SHA1

      5b6ec3318c82a7df78b9207bef7d45be2e470198

    • SHA256

      4f2696febfd29143776e40f478e9d1d9ee36d73cc662d4666cf065a077ee66fa

    • SHA512

      0666c74e079e14b11de185fa04b55123cd73e5e8be9662b768138e232d336d710ede147e63aa15c9754bed215822f8a6848f518f1391e6e80158c100cf6eabec

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

      suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

    • Vidar Stealer

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

3
T1005

Tasks