General

  • Target

    ArkeiStealer.exe

  • Size

    357KB

  • Sample

    221101-xyc3eaedb8

  • MD5

    5f8dfd814fb0d6216ac509af881683c1

  • SHA1

    75fbf9fc66d628bfe110ae973b8a9c233de27f35

  • SHA256

    7b788dc01e52402adad852c4960170f8058ab901db5c83c5e2fd32485484787a

  • SHA512

    18ddc620749f1b5bc14c2cf2c62424fa670d478f9db790dc014e39d908eb0f7ee9468fae5b0a5ef7e430b7b2d1c4633be7cc09a12bbea7ea784fea8c9cb6182d

  • SSDEEP

    6144:WSGdKzkJgVrMf/hXx87L6D80DbcxgHSsnLJ3r0r:WSRzk6Y3hB87+bVZ2r

Malware Config

Extracted

Family

vidar

Version

55.3

Botnet

1636

C2

https://t.me/dghzq

https://t.me/zjsqpz

https://t.me/fqwexzq

Attributes
  • profile_id

    1636

Targets

    • Target

      ArkeiStealer.exe

    • Size

      357KB

    • MD5

      5f8dfd814fb0d6216ac509af881683c1

    • SHA1

      75fbf9fc66d628bfe110ae973b8a9c233de27f35

    • SHA256

      7b788dc01e52402adad852c4960170f8058ab901db5c83c5e2fd32485484787a

    • SHA512

      18ddc620749f1b5bc14c2cf2c62424fa670d478f9db790dc014e39d908eb0f7ee9468fae5b0a5ef7e430b7b2d1c4633be7cc09a12bbea7ea784fea8c9cb6182d

    • SSDEEP

      6144:WSGdKzkJgVrMf/hXx87L6D80DbcxgHSsnLJ3r0r:WSRzk6Y3hB87+bVZ2r

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks