General

  • Target

    8eccdd9cfea1de66d15d476a5210a5594eeb9e977e185cbc08222ea67039ec61

  • Size

    279KB

  • Sample

    221001-rsefdshbdj

  • MD5

    c68dccdab2d5cfa8d0d4e3ce4c090cd5

  • SHA1

    113457d241c2db680a310c6707e1ee0b67ecbf82

  • SHA256

    8eccdd9cfea1de66d15d476a5210a5594eeb9e977e185cbc08222ea67039ec61

  • SHA512

    98451338e50416e3e6e6b3982e483add0c45fc4f5a4f8257cce35452b52d8c813779b189684032cac1d3846474908e94b4cd2addf92b5ba14cf6b6195c1f926e

  • SSDEEP

    6144:REqOM7phBbVhI4Vj6KLaQi+HcCZnObnAaniJ6:R17phBbVX+Qi+HcgOpH

Malware Config

Extracted

Family

vidar

Version

54.7

Botnet

867

C2

https://t.me/trampapanam

https://nerdculture.de/@yoxhyp

http://5.161.21.185:80

Attributes
  • profile_id

    867

Targets

    • Target

      8eccdd9cfea1de66d15d476a5210a5594eeb9e977e185cbc08222ea67039ec61

    • Size

      279KB

    • MD5

      c68dccdab2d5cfa8d0d4e3ce4c090cd5

    • SHA1

      113457d241c2db680a310c6707e1ee0b67ecbf82

    • SHA256

      8eccdd9cfea1de66d15d476a5210a5594eeb9e977e185cbc08222ea67039ec61

    • SHA512

      98451338e50416e3e6e6b3982e483add0c45fc4f5a4f8257cce35452b52d8c813779b189684032cac1d3846474908e94b4cd2addf92b5ba14cf6b6195c1f926e

    • SSDEEP

      6144:REqOM7phBbVhI4Vj6KLaQi+HcCZnObnAaniJ6:R17phBbVX+Qi+HcgOpH

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks