General

  • Target

    Setup.rar

  • Size

    109KB

  • Sample

    221125-r6ecjsee96

  • MD5

    9e98f5e52ed5189d2ae7e81a25f32357

  • SHA1

    e8ae9bd295478514d1c45351f1e5eaace6bc679e

  • SHA256

    60d7e79be06f2a7a16a5e817e22ca0ac7121982f838eea2019036b4ce941a09d

  • SHA512

    4c7564e45639ffce4a30bb4d367e33002b3191dac7847819cef4fc57b5adc5ccb1192bb3c123d69202c06e43401a361507aa29cee52abb618d353d09346359aa

  • SSDEEP

    3072:Mj/2CxezhvUg+XZ6At12UaPKZ+4xdQqLo:MjOCMha6At4UKKfxpk

Malware Config

Extracted

Family

vidar

Version

55.9

Botnet

1861

C2

https://t.me/headshotsonly

https://steamcommunity.com/profiles/76561199436777531

Attributes
  • profile_id

    1861

Targets

    • Target

      Setup.exe

    • Size

      555.0MB

    • MD5

      20290c21bd90a37d4af244cd359eb659

    • SHA1

      5b9ae7a3c7124ea41daee91eef5e3bfa7915c854

    • SHA256

      92d4af6eb062a7361d858ddafef6bce614ab3ad31085608e68a42346bdc0fb9a

    • SHA512

      994c9c00634f013666a4e99b03105efce7eb24ded21dcf2df2aef147e97c4ea9610383e929b8a18b6fd5824536b9c44ec34bc0f2057be62e8001a3d1b2320995

    • SSDEEP

      1536:H+nPW1rTCPNpNIE44YygCnGc7lnEhxPJ0mLQkrMU0C710QApK7zsZ7zCc:enPuIlYyzGc7lSxB0mM5KEZqc

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks