General

  • Target

    Setup.eexe

  • Size

    481KB

  • Sample

    221205-vc4l5acb4s

  • MD5

    96d5b9003eeee689e0e92d66d700cbc8

  • SHA1

    25306aa64b79a7b75e12a4b099bb3ed4569493da

  • SHA256

    8cff070a61e966da876a22d0442e0ad007424b10ba9b7af91541dc3516679c50

  • SHA512

    112bdc43f9a902d95797bd1aba2c9fc1bd3b5e7604e27fbccf0b8ea5d4539556ddeb7c09c7094ae730281c8f0f040658a44f1778a8126d2db50c9c976fe99d31

  • SSDEEP

    12288:2PPniLIJy2nozeeepd6mobUq/ZmiBVBkKb:4PiOy2nozJeTCU+Z

Malware Config

Extracted

Family

vidar

Version

56

Botnet

1702

C2

https://t.me/asifrazatg

https://steamcommunity.com/profiles/76561199439929669

Attributes
  • profile_id

    1702

Targets

    • Target

      Setup.eexe

    • Size

      481KB

    • MD5

      96d5b9003eeee689e0e92d66d700cbc8

    • SHA1

      25306aa64b79a7b75e12a4b099bb3ed4569493da

    • SHA256

      8cff070a61e966da876a22d0442e0ad007424b10ba9b7af91541dc3516679c50

    • SHA512

      112bdc43f9a902d95797bd1aba2c9fc1bd3b5e7604e27fbccf0b8ea5d4539556ddeb7c09c7094ae730281c8f0f040658a44f1778a8126d2db50c9c976fe99d31

    • SSDEEP

      12288:2PPniLIJy2nozeeepd6mobUq/ZmiBVBkKb:4PiOy2nozJeTCU+Z

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks