General

  • Target

    torbrowser - Kopie.zip

  • Size

    1.2MB

  • Sample

    221219-pa8v6saa4t

  • MD5

    b321ce7bb5160cf7e8d6072fb180457e

  • SHA1

    9d8476ab9a8ecd19b2100a9e76394a3b098d9ebc

  • SHA256

    4ec83644270f532923189ca42894864d2e8a68bc9d19b43457593ad5a3bc3957

  • SHA512

    abb97c3b20682557424a7952a0f0199ddc80f982428d18fc6e2c0535fd56c360430f9c570d210e174e0516c0b822d969835638a90b0de1b2dff83dd9f94f23d1

  • SSDEEP

    12288:UhzUtnXQolEWFk/+/hTEpj+D5nTCPptim6:UhzUtngFNW/hTx5nTCWN

Malware Config

Extracted

Family

vidar

Version

56.1

Botnet

1797

C2

https://t.me/dishasta

https://steamcommunity.com/profiles/76561199441933804

Attributes
  • profile_id

    1797

Targets

    • Target

      torbrowser/torbrowser.exe

    • Size

      694.2MB

    • MD5

      ac3699061b05b673b7cbfc7ac2445fb2

    • SHA1

      b6fafff988d361f2d25c873763c6e256224e7014

    • SHA256

      320366ee8ce3567531042c22aad8b29bc6fb29a91ce091c627faa3b8395ec533

    • SHA512

      9357aec09cc275c4c24dc0949845984d65914122635e0695e5c8d69a782fe9530cc48a93bc2850af69c16f6cd3ec1cc87f49743a639dc54d85fdaa212a652358

    • SSDEEP

      12288:0ZqM+DLDfcPSlUWFmFsZDTepju/5bHCZjtio:0ZGDLjg1xuZDTR5bHCe

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks