General

  • Target

    01dd09f52d0accfd655731ed746a9c3742dc7ee7684aa5a4002155897147dc20.exe

  • Size

    603KB

  • Sample

    220913-hkr7vaagap

  • MD5

    fc36426495ee630d0b1b8f01dc716a4a

  • SHA1

    1f8f8d9c120fe300d1f4123bf3b1725a64374dfd

  • SHA256

    01dd09f52d0accfd655731ed746a9c3742dc7ee7684aa5a4002155897147dc20

  • SHA512

    8c3af38acb8e9a49aba600eeac8037158ded7f51cfcbf80550cc0d8ca0cf97c7d9a4d600e68050353680e465ea2dab09dd1b20dccfc47c9aa24dd6793d6dbea8

  • SSDEEP

    12288:WE/uGuw1DPs5P9PTxy9bd46JgqPMQhB6NLKdLhTh3QHQIE:WkueDcVTxy9jgtQKiTgHQIE

Malware Config

Extracted

Family

vidar

Version

54.3

Botnet

1375

C2

https://t.me/karacakahve

https://ieji.de/@tiagoa96

Attributes
  • profile_id

    1375

Targets

    • Target

      01dd09f52d0accfd655731ed746a9c3742dc7ee7684aa5a4002155897147dc20.exe

    • Size

      603KB

    • MD5

      fc36426495ee630d0b1b8f01dc716a4a

    • SHA1

      1f8f8d9c120fe300d1f4123bf3b1725a64374dfd

    • SHA256

      01dd09f52d0accfd655731ed746a9c3742dc7ee7684aa5a4002155897147dc20

    • SHA512

      8c3af38acb8e9a49aba600eeac8037158ded7f51cfcbf80550cc0d8ca0cf97c7d9a4d600e68050353680e465ea2dab09dd1b20dccfc47c9aa24dd6793d6dbea8

    • SSDEEP

      12288:WE/uGuw1DPs5P9PTxy9bd46JgqPMQhB6NLKdLhTh3QHQIE:WkueDcVTxy9jgtQKiTgHQIE

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Loads dropped DLL

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks