General

  • Target

    test.exe

  • Size

    292KB

  • Sample

    221123-p1kk9scg28

  • MD5

    4b2270c3dea2e8d9725933481467c5ba

  • SHA1

    646da48d74d878550bde45517324c79b1782bedd

  • SHA256

    e34019bf53ec496c426d3697dffeb266143007344ca77519bcabdbc28aecbade

  • SHA512

    fa7d50f8f0380e891a1a8bb45ab96ce9dd72c97b1d504c91c1cc68276e136637ca448da77970d422639c04b6c9765061d9c498945cc0d03213652a6eb2f54e48

  • SSDEEP

    6144:/BzPF1ACC2Ki7cUoSSwu5To9QsMlNAwMTl7p0zeXUfzWNCoL:xPFh7cUoSSwu5To9QRNAwMTlNEe8CL

Malware Config

Extracted

Family

vidar

Version

55.7

Botnet

1375

C2

https://t.me/deadftx

https://www.tiktok.com/@user6068972597711

Attributes
  • profile_id

    1375

Targets

    • Target

      test.exe

    • Size

      292KB

    • MD5

      4b2270c3dea2e8d9725933481467c5ba

    • SHA1

      646da48d74d878550bde45517324c79b1782bedd

    • SHA256

      e34019bf53ec496c426d3697dffeb266143007344ca77519bcabdbc28aecbade

    • SHA512

      fa7d50f8f0380e891a1a8bb45ab96ce9dd72c97b1d504c91c1cc68276e136637ca448da77970d422639c04b6c9765061d9c498945cc0d03213652a6eb2f54e48

    • SSDEEP

      6144:/BzPF1ACC2Ki7cUoSSwu5To9QsMlNAwMTl7p0zeXUfzWNCoL:xPFh7cUoSSwu5To9QRNAwMTlNEe8CL

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks