General

  • Target

    SetupYukix64bit.exe

  • Size

    1.3MB

  • Sample

    221116-y2dzjsgg31

  • MD5

    edfd759fcec73085ed3fe3c3da0006d1

  • SHA1

    87fbaa609045bb1eb96bff7c4fe8c91e007c7055

  • SHA256

    2b57df19c9d33389491a5ebd6a38421ffb030af9ce703328910ae7a8686a2f37

  • SHA512

    2453ecc0db6d7aefb17dd07f6f77ec81cd465e2203beb2c759ac2b1988e50cf451642377b61d05b492080c6d5276f932c3968ba1f64df3e8a0d7318e1a98e0d9

  • SSDEEP

    24576:puT+E/uX1eJzBECjwnnzCBQaPPPg6FRB6nyNP6kVU+UW40:e+8BECjwnzCBQaZx6nyNPLU+UF0

Malware Config

Extracted

Family

vidar

Version

55.7

Botnet

1325

C2

https://t.me/deadftx

https://www.ultimate-guitar.com/u/smbfupkuhrgc1

Attributes
  • profile_id

    1325

Targets

    • Target

      SetupYukix64bit.exe

    • Size

      1.3MB

    • MD5

      edfd759fcec73085ed3fe3c3da0006d1

    • SHA1

      87fbaa609045bb1eb96bff7c4fe8c91e007c7055

    • SHA256

      2b57df19c9d33389491a5ebd6a38421ffb030af9ce703328910ae7a8686a2f37

    • SHA512

      2453ecc0db6d7aefb17dd07f6f77ec81cd465e2203beb2c759ac2b1988e50cf451642377b61d05b492080c6d5276f932c3968ba1f64df3e8a0d7318e1a98e0d9

    • SSDEEP

      24576:puT+E/uX1eJzBECjwnnzCBQaPPPg6FRB6nyNP6kVU+UW40:e+8BECjwnzCBQaZx6nyNPLU+UF0

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

3
T1005

Command and Control

Web Service

1
T1102

Tasks