General

  • Target

    https://download2275.mediafire.com/sy4yu80ddjzg/bo4rvig0uux6rvl/GTA+Mod+menu.rar

  • Sample

    220725-kdbbvsbedp

Malware Config

Extracted

Family

vidar

Version

53.3

Botnet

1375

C2

https://t.me/korstonsales

https://climatejustice.social/@ffoleg94

Attributes
  • profile_id

    1375

Targets

    • Target

      https://download2275.mediafire.com/sy4yu80ddjzg/bo4rvig0uux6rvl/GTA+Mod+menu.rar

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

      suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

    • Executes dropped EXE

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks