General

  • Target

    b20a974b855f73204e9cd5d445f2112d.exe

  • Size

    255KB

  • Sample

    221004-h6nfsahbd5

  • MD5

    b20a974b855f73204e9cd5d445f2112d

  • SHA1

    4f29402bbccb50859b439723bb6c87516d83999b

  • SHA256

    fa64bc211d04136ec885512c04ca91ed3b7ac8f4cf3cad1b254590afbede44d1

  • SHA512

    6977b9165fb10657c577db5b5becce9e45caab31ddc4b8fde69f08e762b5cda68c8604cb9385d0eb9dd18c240ad02b2d5b13bf0d39a6d10dc932de724c42ef39

  • SSDEEP

    6144:VX2Ree+YJZRfWP9qmeyRRlJQG9GguRJ5r9dtpU:VX2Ree+YJZReP96i6G9GpNDI

Malware Config

Extracted

Family

vidar

Version

54.9

Botnet

517

C2

https://t.me/larsenup

https://ioc.exchange/@zebra54

Attributes
  • profile_id

    517

Targets

    • Target

      b20a974b855f73204e9cd5d445f2112d.exe

    • Size

      255KB

    • MD5

      b20a974b855f73204e9cd5d445f2112d

    • SHA1

      4f29402bbccb50859b439723bb6c87516d83999b

    • SHA256

      fa64bc211d04136ec885512c04ca91ed3b7ac8f4cf3cad1b254590afbede44d1

    • SHA512

      6977b9165fb10657c577db5b5becce9e45caab31ddc4b8fde69f08e762b5cda68c8604cb9385d0eb9dd18c240ad02b2d5b13bf0d39a6d10dc932de724c42ef39

    • SSDEEP

      6144:VX2Ree+YJZRfWP9qmeyRRlJQG9GguRJ5r9dtpU:VX2Ree+YJZReP96i6G9GpNDI

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks