General

  • Target

    f9655fbff56932b0be83e2e58b52a4ba04e9d7b7a4d24fb24bc177463af74da7

  • Size

    255KB

  • Sample

    221026-ehkhfaefc7

  • MD5

    c1863a86cdeb57ba02ffccca4e499a73

  • SHA1

    f1b10500deb59330b74a3bd236d2e7a2e4cefa72

  • SHA256

    f9655fbff56932b0be83e2e58b52a4ba04e9d7b7a4d24fb24bc177463af74da7

  • SHA512

    2824e4c13b0d81835812523ec94a2ab7f44d9bc51ac7bf7e09dfe008876d475989a71c0bdf2bbb2d65f131a9b7df7490357af1713164a6748f7ef71b2a259ad4

  • SSDEEP

    3072:qXKpCMLycLTjC/Nge5hk+mRGzMCTSK4pW2CjlD9dkKU9jU+HgEDJg2M4k:KHML1La6e5hk+twEUTOhdVU4mJD+2K

Malware Config

Extracted

Family

vidar

Version

55.2

Botnet

937

C2

https://t.me/slivetalks

https://c.im/@xinibin420

Attributes
  • profile_id

    937

Targets

    • Target

      f9655fbff56932b0be83e2e58b52a4ba04e9d7b7a4d24fb24bc177463af74da7

    • Size

      255KB

    • MD5

      c1863a86cdeb57ba02ffccca4e499a73

    • SHA1

      f1b10500deb59330b74a3bd236d2e7a2e4cefa72

    • SHA256

      f9655fbff56932b0be83e2e58b52a4ba04e9d7b7a4d24fb24bc177463af74da7

    • SHA512

      2824e4c13b0d81835812523ec94a2ab7f44d9bc51ac7bf7e09dfe008876d475989a71c0bdf2bbb2d65f131a9b7df7490357af1713164a6748f7ef71b2a259ad4

    • SSDEEP

      3072:qXKpCMLycLTjC/Nge5hk+mRGzMCTSK4pW2CjlD9dkKU9jU+HgEDJg2M4k:KHML1La6e5hk+twEUTOhdVU4mJD+2K

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

3
T1005

Tasks