General

  • Target

    2231160e71faf8674b8efc0cedf3384db3acc5d66f0276c76b18c7cb5f842ce0.exe

  • Size

    2.0MB

  • Sample

    220923-amrp4agegm

  • MD5

    ea9fa7d01bea905b858de54fa01ad7fa

  • SHA1

    26115372eb48ee842ac9b9f0737a98dfe21160ed

  • SHA256

    2231160e71faf8674b8efc0cedf3384db3acc5d66f0276c76b18c7cb5f842ce0

  • SHA512

    a0254d601d3fc31ac8a6de2a05daf2442049a7967667e9fddeeda58e43c3166ede189d91bf1d878d2bb55c6aced3bcc22e8c163981d645c99528b15b4ff8f951

  • SSDEEP

    24576:tbTBwmZ33qAioFmymA7mrB6nvBt5v+rpyzzL:F/aPg7KAn5/vapuL

Malware Config

Extracted

Family

vidar

Version

54.6

Botnet

1672

C2

https://t.me/huobiinside

https://mas.to/@kyriazhs1975

Attributes
  • profile_id

    1672

Targets

    • Target

      2231160e71faf8674b8efc0cedf3384db3acc5d66f0276c76b18c7cb5f842ce0.exe

    • Size

      2.0MB

    • MD5

      ea9fa7d01bea905b858de54fa01ad7fa

    • SHA1

      26115372eb48ee842ac9b9f0737a98dfe21160ed

    • SHA256

      2231160e71faf8674b8efc0cedf3384db3acc5d66f0276c76b18c7cb5f842ce0

    • SHA512

      a0254d601d3fc31ac8a6de2a05daf2442049a7967667e9fddeeda58e43c3166ede189d91bf1d878d2bb55c6aced3bcc22e8c163981d645c99528b15b4ff8f951

    • SSDEEP

      24576:tbTBwmZ33qAioFmymA7mrB6nvBt5v+rpyzzL:F/aPg7KAn5/vapuL

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

3
T1005

Tasks