General

  • Target

    0e762aeb29d9bd2d747a6f897d33e0b8d0808cfd07cb9be945a513f88f6c1046.exe

  • Size

    274KB

  • Sample

    221121-xc9jgsgb2t

  • MD5

    cbe8b213d89ecab341264b30b7c85041

  • SHA1

    a6cae6c2f2c73289c1cc3768b5e1bfbd97bd837c

  • SHA256

    0e762aeb29d9bd2d747a6f897d33e0b8d0808cfd07cb9be945a513f88f6c1046

  • SHA512

    c7841f3bc43077ffb0e6c3587b5fa4beabf9fbaa195793045d4435fdafc9dda35a269c3d7f8c2cc454ae497fa09bc9a78652bf9c42657e4d6a35d1b8afbd1bb2

  • SSDEEP

    6144:rOduTrlY+LMTrYOR2EyBhrLW7haO/qZyjSeJhO7NS:rOeY+4vdR43mhaIqIOR

Malware Config

Extracted

Family

vidar

Version

55.7

Botnet

937

C2

https://t.me/deadftx

https://www.ultimate-guitar.com/u/smbfupkuhrgc1

Attributes
  • profile_id

    937

Targets

    • Target

      0e762aeb29d9bd2d747a6f897d33e0b8d0808cfd07cb9be945a513f88f6c1046.exe

    • Size

      274KB

    • MD5

      cbe8b213d89ecab341264b30b7c85041

    • SHA1

      a6cae6c2f2c73289c1cc3768b5e1bfbd97bd837c

    • SHA256

      0e762aeb29d9bd2d747a6f897d33e0b8d0808cfd07cb9be945a513f88f6c1046

    • SHA512

      c7841f3bc43077ffb0e6c3587b5fa4beabf9fbaa195793045d4435fdafc9dda35a269c3d7f8c2cc454ae497fa09bc9a78652bf9c42657e4d6a35d1b8afbd1bb2

    • SSDEEP

      6144:rOduTrlY+LMTrYOR2EyBhrLW7haO/qZyjSeJhO7NS:rOeY+4vdR43mhaIqIOR

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

3
T1005

Tasks