General

  • Target

    Ip_scanner.exe

  • Size

    5.1MB

  • Sample

    221117-vlt42sba4s

  • MD5

    899364e9f5edeb6ad4fff930eb1457a7

  • SHA1

    b164f56e2ba1fc72d0813e0b4c9ba91e82ab2027

  • SHA256

    dfd84071a0a6f1ab986d52f811f3473474e5ad94585046311d1b0ace2322329a

  • SHA512

    cfa5a2c8454787a20e029ccd13868b2121fead7e88dcdb44d1c0171a651515854009c17f4402d5ffab5aae715db67be134b6b2049ce8a96a1c66c9ffa8f302af

  • SSDEEP

    98304:B5Sn52sYtLDfSR654zrPp8/Rq3ZEVkERxCFJiT0Gu4ueeZk:w4sxR65OpsEZEVjvMJiAMutk

Malware Config

Extracted

Family

vidar

Version

53.4

Botnet

1364

C2

https://t.me/cheaptrains

https://mastodon.social/@ffolegg94

Attributes
  • profile_id

    1364

Targets

    • Target

      Ip_scanner.exe

    • Size

      5.1MB

    • MD5

      899364e9f5edeb6ad4fff930eb1457a7

    • SHA1

      b164f56e2ba1fc72d0813e0b4c9ba91e82ab2027

    • SHA256

      dfd84071a0a6f1ab986d52f811f3473474e5ad94585046311d1b0ace2322329a

    • SHA512

      cfa5a2c8454787a20e029ccd13868b2121fead7e88dcdb44d1c0171a651515854009c17f4402d5ffab5aae715db67be134b6b2049ce8a96a1c66c9ffa8f302af

    • SSDEEP

      98304:B5Sn52sYtLDfSR654zrPp8/Rq3ZEVkERxCFJiT0Gu4ueeZk:w4sxR65OpsEZEVjvMJiAMutk

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Vidar Stealer

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks