General

  • Target

    file.exe

  • Size

    623KB

  • Sample

    221203-qxyjdsed44

  • MD5

    b222f2f0919a0ac896e3f83f3b9b6003

  • SHA1

    37670412f4b98641407944b86df43f40bc23a67f

  • SHA256

    292234b4e44187b5549566ead6297f05dc6b40310e4f1b1384ce190a79891117

  • SHA512

    ac1ed8f225c1aabfb18ef2c773cc42dc0972391760ca0fa50ba58602bbfecb9c113eed0fcb5685d3719b4dd936bff2e21cf8da887ff83b78ccc1af4097244964

  • SSDEEP

    12288:FsJ5/WfL8JGhhC7OiTa8g5MdNXLSR6ESvzY:Fw+8JGOac909CY

Malware Config

Extracted

Family

vidar

Version

56

Botnet

1679

C2

https://t.me/asifrazatg

https://steamcommunity.com/profiles/76561199439929669

Attributes
  • profile_id

    1679

Targets

    • Target

      file.exe

    • Size

      623KB

    • MD5

      b222f2f0919a0ac896e3f83f3b9b6003

    • SHA1

      37670412f4b98641407944b86df43f40bc23a67f

    • SHA256

      292234b4e44187b5549566ead6297f05dc6b40310e4f1b1384ce190a79891117

    • SHA512

      ac1ed8f225c1aabfb18ef2c773cc42dc0972391760ca0fa50ba58602bbfecb9c113eed0fcb5685d3719b4dd936bff2e21cf8da887ff83b78ccc1af4097244964

    • SSDEEP

      12288:FsJ5/WfL8JGhhC7OiTa8g5MdNXLSR6ESvzY:Fw+8JGOac909CY

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Loads dropped DLL

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks