General

  • Target

    Setup.exe

  • Size

    381.1MB

  • Sample

    221103-jqsagaacdn

  • MD5

    919ea65f48fc29a9201a1acf50e641fb

  • SHA1

    9381dd8e0af5e0bf065ab00dd557f4c2ebf7ae51

  • SHA256

    50f8a3767b236fdf50e8c6f01f04bb1004c6c9161f301dbd3639ad83834d7d09

  • SHA512

    e43fa9f97aa6760ac5bd1f4cdc177a1866574cff51dfde30f4a51fa51b63f1b6d3f6cc96d001122199297037a19a8100a76ca64224fcb99bc7c461148eea60b9

  • SSDEEP

    98304:JrUPrkqIBapmyezTnKSkXdumkrjeqH+49WIIjHYpX+S:JrcI/yhSkXdZjG

Malware Config

Extracted

Family

vidar

Version

54.9

Botnet

1281

C2

https://t.me/dsjdsnxshjx

Attributes
  • profile_id

    1281

Targets

    • Target

      Setup.exe

    • Size

      381.1MB

    • MD5

      919ea65f48fc29a9201a1acf50e641fb

    • SHA1

      9381dd8e0af5e0bf065ab00dd557f4c2ebf7ae51

    • SHA256

      50f8a3767b236fdf50e8c6f01f04bb1004c6c9161f301dbd3639ad83834d7d09

    • SHA512

      e43fa9f97aa6760ac5bd1f4cdc177a1866574cff51dfde30f4a51fa51b63f1b6d3f6cc96d001122199297037a19a8100a76ca64224fcb99bc7c461148eea60b9

    • SSDEEP

      98304:JrUPrkqIBapmyezTnKSkXdumkrjeqH+49WIIjHYpX+S:JrcI/yhSkXdZjG

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks