General

  • Target

    vida.exe

  • Size

    1.1MB

  • Sample

    221123-k7w6esdh2s

  • MD5

    a02b7f83447a828d6b26ee2eaa9d338d

  • SHA1

    e4351940f9796e5f3a39cbbc38d8857f70bb95b2

  • SHA256

    faf9fafa302622d32b46956c7ff81da78773366c0e120936a61ceea4c489c5b8

  • SHA512

    8796113e4471c4bd59bccd7a544ea97e5d5195ab5a94eb0257cac28e9c567f17d67ea86f2e840621291a881cf35027e2dced7e62fdccd7cb6f3fbc3fcf2193cb

  • SSDEEP

    12288:k+A8i6HbM3g4iVVDI05MuS5Q2EqQaRDPNoXfNes5cpAvYgD5xs7PyNnBni:PE6HY3grr2E6Z1KlVewD5xQyNBi

Malware Config

Extracted

Family

vidar

Version

55.8

Botnet

1202

C2

https://t.me/headshotsonly

https://steamcommunity.com/profiles/76561199436777531

Attributes
  • profile_id

    1202

Targets

    • Target

      vida.exe

    • Size

      1.1MB

    • MD5

      a02b7f83447a828d6b26ee2eaa9d338d

    • SHA1

      e4351940f9796e5f3a39cbbc38d8857f70bb95b2

    • SHA256

      faf9fafa302622d32b46956c7ff81da78773366c0e120936a61ceea4c489c5b8

    • SHA512

      8796113e4471c4bd59bccd7a544ea97e5d5195ab5a94eb0257cac28e9c567f17d67ea86f2e840621291a881cf35027e2dced7e62fdccd7cb6f3fbc3fcf2193cb

    • SSDEEP

      12288:k+A8i6HbM3g4iVVDI05MuS5Q2EqQaRDPNoXfNes5cpAvYgD5xs7PyNnBni:PE6HY3grr2E6Z1KlVewD5xQyNBi

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks