General

  • Target

    4e4679c3a8fe7e7e2041945ccd7172e3b3722b38c614e07d48d29700312abdd3

  • Size

    342KB

  • Sample

    221204-ggzxvaff81

  • MD5

    34f2030cc003ede5a81fb807cdf393e1

  • SHA1

    b406c5cbc9e2d5b5a4b944a60751c35126eaadb8

  • SHA256

    4e4679c3a8fe7e7e2041945ccd7172e3b3722b38c614e07d48d29700312abdd3

  • SHA512

    2a8036caf46bdf96fdd1780e5cd9c03140f291e4736ec34f69845272643bca951726fe8ec94af80057e7b78c140f818bdd9e23250257a76df34da1419426ffc0

  • SSDEEP

    6144:EioRFuaxgWvhfs/WdbWajWnMW2Rqnm+RXUQYq:EioRFcMhfs/WV0MW3m+RUQY

Malware Config

Extracted

Family

vidar

Version

56

Botnet

1148

C2

https://t.me/asifrazatg

https://steamcommunity.com/profiles/76561199439929669

Attributes
  • profile_id

    1148

Targets

    • Target

      4e4679c3a8fe7e7e2041945ccd7172e3b3722b38c614e07d48d29700312abdd3

    • Size

      342KB

    • MD5

      34f2030cc003ede5a81fb807cdf393e1

    • SHA1

      b406c5cbc9e2d5b5a4b944a60751c35126eaadb8

    • SHA256

      4e4679c3a8fe7e7e2041945ccd7172e3b3722b38c614e07d48d29700312abdd3

    • SHA512

      2a8036caf46bdf96fdd1780e5cd9c03140f291e4736ec34f69845272643bca951726fe8ec94af80057e7b78c140f818bdd9e23250257a76df34da1419426ffc0

    • SSDEEP

      6144:EioRFuaxgWvhfs/WdbWajWnMW2Rqnm+RXUQYq:EioRFcMhfs/WV0MW3m+RUQY

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks