General

  • Target

    0b98114cfbe3e32c681ebb5a4a867391da2d235b771227af97f46825b95de3f2

  • Size

    301KB

  • Sample

    221109-mp4tnahfeq

  • MD5

    9964dec7f63403963374ebae4ba27e44

  • SHA1

    51c8d242bbbc34b9d0135bcdaa53b5e78449b73d

  • SHA256

    0b98114cfbe3e32c681ebb5a4a867391da2d235b771227af97f46825b95de3f2

  • SHA512

    41cc95c052b85997c47cceaa0665788607b577005e93ae08b48b54d10a3ead190f56219238d3579e45ce18601220474f8e860ad8efb1d22c475070d79c202937

  • SSDEEP

    6144:LULLZmLoTDBbi+HYAfLrCnMvIX5t+9PIe1v3x1m:QsLoTDBbvLsCut+S

Malware Config

Extracted

Family

vidar

Version

55.6

Botnet

517

C2

https://t.me/seclab_new

https://mas.to/@ofadex

Attributes
  • profile_id

    517

Targets

    • Target

      0b98114cfbe3e32c681ebb5a4a867391da2d235b771227af97f46825b95de3f2

    • Size

      301KB

    • MD5

      9964dec7f63403963374ebae4ba27e44

    • SHA1

      51c8d242bbbc34b9d0135bcdaa53b5e78449b73d

    • SHA256

      0b98114cfbe3e32c681ebb5a4a867391da2d235b771227af97f46825b95de3f2

    • SHA512

      41cc95c052b85997c47cceaa0665788607b577005e93ae08b48b54d10a3ead190f56219238d3579e45ce18601220474f8e860ad8efb1d22c475070d79c202937

    • SSDEEP

      6144:LULLZmLoTDBbi+HYAfLrCnMvIX5t+9PIe1v3x1m:QsLoTDBbvLsCut+S

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks