General

  • Target

    a7c4c5167dea1bd6bce80825b885579c.exe

  • Size

    3.9MB

  • Sample

    221205-a7hb6afa8x

  • MD5

    a7c4c5167dea1bd6bce80825b885579c

  • SHA1

    88d3b7d19de47360eace7de6940ddcef22319572

  • SHA256

    59dc03661de2c94670f2eabdd53ae8c40cf01f8f8abe1abdb2181810ff31e004

  • SHA512

    02873b0b7b29fe90bf3b8e5d3e8abefbdd248c5c4cb9a25d9b543707b6a0b76da9e101109f9ec9e921a851e15475170beb7e9212b230fbf91b07a6b56d73f079

  • SSDEEP

    98304:5A6++cTaDkiDYVIpfhisaphw97MUxG3Wa2b5bQSkO6k9NFzDDgIU/n3+wd:o+UMkiu8ZS6LItYXRzD0IUv3+s

Malware Config

Extracted

Family

vidar

Version

56

Botnet

1364

C2

https://t.me/asifrazatg

https://steamcommunity.com/profiles/76561199439929669

Attributes
  • profile_id

    1364

Targets

    • Target

      a7c4c5167dea1bd6bce80825b885579c.exe

    • Size

      3.9MB

    • MD5

      a7c4c5167dea1bd6bce80825b885579c

    • SHA1

      88d3b7d19de47360eace7de6940ddcef22319572

    • SHA256

      59dc03661de2c94670f2eabdd53ae8c40cf01f8f8abe1abdb2181810ff31e004

    • SHA512

      02873b0b7b29fe90bf3b8e5d3e8abefbdd248c5c4cb9a25d9b543707b6a0b76da9e101109f9ec9e921a851e15475170beb7e9212b230fbf91b07a6b56d73f079

    • SSDEEP

      98304:5A6++cTaDkiDYVIpfhisaphw97MUxG3Wa2b5bQSkO6k9NFzDDgIU/n3+wd:o+UMkiu8ZS6LItYXRzD0IUv3+s

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks