General

  • Target

    d4e34fa2627968f7c9fbdb71561eb1956c88be9cb654c03fc71400675de855fb

  • Size

    222KB

  • Sample

    221026-exj58aefg5

  • MD5

    f8232029ca8fac08daa1a321d51a0712

  • SHA1

    a64b56d95905ff2093ebd612a4591c983ae5a1ab

  • SHA256

    d4e34fa2627968f7c9fbdb71561eb1956c88be9cb654c03fc71400675de855fb

  • SHA512

    828e04118edd53d78281b6cf7a0ed105ff7b23cccce19a880a6ada5ce993d5aeb6640e8107878bd3a9fa04b6f703807bd85ba1cd8f1a51d3b884ab90b6cba0f1

  • SSDEEP

    6144:+3JarcU7lqLXenevVMk5Ymplf+b7cMVw:+3Jarp7Y7enet/5lf+3lVw

Malware Config

Extracted

Family

vidar

Version

55.2

Botnet

937

C2

https://t.me/slivetalks

https://c.im/@xinibin420

Attributes
  • profile_id

    937

Targets

    • Target

      d4e34fa2627968f7c9fbdb71561eb1956c88be9cb654c03fc71400675de855fb

    • Size

      222KB

    • MD5

      f8232029ca8fac08daa1a321d51a0712

    • SHA1

      a64b56d95905ff2093ebd612a4591c983ae5a1ab

    • SHA256

      d4e34fa2627968f7c9fbdb71561eb1956c88be9cb654c03fc71400675de855fb

    • SHA512

      828e04118edd53d78281b6cf7a0ed105ff7b23cccce19a880a6ada5ce993d5aeb6640e8107878bd3a9fa04b6f703807bd85ba1cd8f1a51d3b884ab90b6cba0f1

    • SSDEEP

      6144:+3JarcU7lqLXenevVMk5Ymplf+b7cMVw:+3Jarp7Y7enet/5lf+3lVw

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

3
T1005

Tasks