General

  • Target

    a0ec4c328f0fa06f08188a42178ee4a60a1c27187b94141fea3d802a422e0b83

  • Size

    341KB

  • Sample

    221204-hxvthabe8z

  • MD5

    47418752e7f73dd7d5808b20b91875c0

  • SHA1

    0d50e3df2c274e20920d4b0273772d5f4665d42c

  • SHA256

    a0ec4c328f0fa06f08188a42178ee4a60a1c27187b94141fea3d802a422e0b83

  • SHA512

    dc735eea087f36bcbe3589ebc9943cb9e5ebc18a569d57aa233267b11322f3303d482c4e730421e46ac3d626e727e71117224af84d01afc9116be1c8fe90980a

  • SSDEEP

    6144:2+oN0A12KawOpSrC6XlnMW2RqnMXsEy7Y:2+oNi5wOpgMW3M8vY

Malware Config

Extracted

Family

vidar

Version

56

Botnet

1148

C2

https://t.me/asifrazatg

https://steamcommunity.com/profiles/76561199439929669

Attributes
  • profile_id

    1148

Targets

    • Target

      a0ec4c328f0fa06f08188a42178ee4a60a1c27187b94141fea3d802a422e0b83

    • Size

      341KB

    • MD5

      47418752e7f73dd7d5808b20b91875c0

    • SHA1

      0d50e3df2c274e20920d4b0273772d5f4665d42c

    • SHA256

      a0ec4c328f0fa06f08188a42178ee4a60a1c27187b94141fea3d802a422e0b83

    • SHA512

      dc735eea087f36bcbe3589ebc9943cb9e5ebc18a569d57aa233267b11322f3303d482c4e730421e46ac3d626e727e71117224af84d01afc9116be1c8fe90980a

    • SSDEEP

      6144:2+oN0A12KawOpSrC6XlnMW2RqnMXsEy7Y:2+oNi5wOpgMW3M8vY

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

3
T1005

Command and Control

Web Service

1
T1102

Tasks