General

  • Target

    11f9829d6e35d28cdd44e66a30bf6db39d5cbcae88a3743ba4555b89c805b4a4

  • Size

    1.3MB

  • Sample

    221011-dzc91scgdq

  • MD5

    65098ca099cf2871ace5c4439c14e86d

  • SHA1

    409dd3cf84a2b799c9a2ef90ce8b1daa25bf8fbf

  • SHA256

    11f9829d6e35d28cdd44e66a30bf6db39d5cbcae88a3743ba4555b89c805b4a4

  • SHA512

    1242ea2310646835596c0ae5290db2f9722c772e2b306a7aead64dcb6e7394d177718196262a4ec4d52277f08f59e0f358cacad5e62a9c499f720ecb5b0b9b4a

  • SSDEEP

    24576:JUBwmwMTA+Ya1NuDOvpPkdbBB4bJD4OL3LVocDzO5WxjuaqhKong9uYoaEvW8J+y:JUBwmwMTA+YGuDOhkdNBG94OLpocXZvG

Malware Config

Extracted

Family

vidar

Version

54.9

Botnet

1680

C2

https://t.me/larsenup

https://ioc.exchange/@zebra54

Attributes
  • profile_id

    1680

Targets

    • Target

      11f9829d6e35d28cdd44e66a30bf6db39d5cbcae88a3743ba4555b89c805b4a4

    • Size

      1.3MB

    • MD5

      65098ca099cf2871ace5c4439c14e86d

    • SHA1

      409dd3cf84a2b799c9a2ef90ce8b1daa25bf8fbf

    • SHA256

      11f9829d6e35d28cdd44e66a30bf6db39d5cbcae88a3743ba4555b89c805b4a4

    • SHA512

      1242ea2310646835596c0ae5290db2f9722c772e2b306a7aead64dcb6e7394d177718196262a4ec4d52277f08f59e0f358cacad5e62a9c499f720ecb5b0b9b4a

    • SSDEEP

      24576:JUBwmwMTA+Ya1NuDOvpPkdbBB4bJD4OL3LVocDzO5WxjuaqhKong9uYoaEvW8J+y:JUBwmwMTA+YGuDOhkdNBG94OLpocXZvG

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Collection

Data from Local System

3
T1005

Tasks