General

  • Target

    bde9d4072df8de9f47127966f95d735edb25ef48f9a65c23e8aeaa45a76ea391

  • Size

    254KB

  • Sample

    221026-cl1ygseefl

  • MD5

    76f325656b6c72a28cceb40af36e7787

  • SHA1

    ff19b08be4d3d20ed17dba6b8c088e4bab7e2472

  • SHA256

    bde9d4072df8de9f47127966f95d735edb25ef48f9a65c23e8aeaa45a76ea391

  • SHA512

    e51ad1d6f342c466ec5c403abec777ae9cf01576e589cab80dcfa68210b1f747d76caac2f120ce983b6cdcede89368308188f67fdb16a1f890dd0086347891e7

  • SSDEEP

    6144:eVchrL/MxI8+9s5MH8tMp17ryj+aAKuC:eVMzMxI8+l2Mp17IpuC

Malware Config

Extracted

Family

vidar

Version

55.2

Botnet

937

C2

https://t.me/slivetalks

https://c.im/@xinibin420

Attributes
  • profile_id

    937

Targets

    • Target

      bde9d4072df8de9f47127966f95d735edb25ef48f9a65c23e8aeaa45a76ea391

    • Size

      254KB

    • MD5

      76f325656b6c72a28cceb40af36e7787

    • SHA1

      ff19b08be4d3d20ed17dba6b8c088e4bab7e2472

    • SHA256

      bde9d4072df8de9f47127966f95d735edb25ef48f9a65c23e8aeaa45a76ea391

    • SHA512

      e51ad1d6f342c466ec5c403abec777ae9cf01576e589cab80dcfa68210b1f747d76caac2f120ce983b6cdcede89368308188f67fdb16a1f890dd0086347891e7

    • SSDEEP

      6144:eVchrL/MxI8+9s5MH8tMp17ryj+aAKuC:eVMzMxI8+l2Mp17IpuC

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Tasks