General

  • Target

    file.exe

  • Size

    401KB

  • Sample

    221205-b9t96sed76

  • MD5

    37980aee9719695d908aa93cfe0b41a0

  • SHA1

    643d6b8bb8a38187711b6fe8a16806debd274c68

  • SHA256

    33b318b9a8752c39d56c842ee1d82dc01ee6f495ff7304f1ed81da18bacdcda0

  • SHA512

    6b7add23631f303387de82357c9fa29ba4f7deec184b18e58123d172ae6afdefd19cf4d336c16ed4e5c561e55a2420b65d34ddae00c69ea555ef428f5cfd0261

  • SSDEEP

    12288:soKWsoYjgf3zeEulPPACkqQrF+04Ns+Fb:soKWw6DtulzQrF+RmCb

Malware Config

Extracted

Family

vidar

Version

56

Botnet

1148

C2

https://t.me/asifrazatg

https://steamcommunity.com/profiles/76561199439929669

Attributes
  • profile_id

    1148

Targets

    • Target

      file.exe

    • Size

      401KB

    • MD5

      37980aee9719695d908aa93cfe0b41a0

    • SHA1

      643d6b8bb8a38187711b6fe8a16806debd274c68

    • SHA256

      33b318b9a8752c39d56c842ee1d82dc01ee6f495ff7304f1ed81da18bacdcda0

    • SHA512

      6b7add23631f303387de82357c9fa29ba4f7deec184b18e58123d172ae6afdefd19cf4d336c16ed4e5c561e55a2420b65d34ddae00c69ea555ef428f5cfd0261

    • SSDEEP

      12288:soKWsoYjgf3zeEulPPACkqQrF+04Ns+Fb:soKWw6DtulzQrF+RmCb

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks