General

  • Target

    4ec83644270f532923189ca42894864d2e8a68bc9d19b43457593ad5a3bc3957.zip

  • Size

    386KB

  • Sample

    221219-wss11aff53

  • MD5

    efff50eb6222bc7989534ee5ef13616e

  • SHA1

    262485c52406faded09e2db64f935e232f160eb0

  • SHA256

    90735ac6772cdd07a3b16eb4dae5df76e6bb6f7f097c18416f507bdeede23c85

  • SHA512

    31135772a5969f48c3e2b44713e94c1b7142f6f999957b8e2a77744ecb29032dee8bb6a3353f821f094d86734ebda8e8dddd8903db4b21f964d7d7e0bf61c87b

  • SSDEEP

    6144:ZsCtEM/FVgxTAGlAz0GWL2Qwv8na/zgv3j4Bvp5ssGNlM3HCS0kimjNP:iCtT/U+tEa/zYOx5olM3CS3P

Malware Config

Extracted

Family

vidar

Version

56.1

Botnet

1797

C2

https://t.me/dishasta

https://steamcommunity.com/profiles/76561199441933804

Attributes
  • profile_id

    1797

Targets

    • Target

      torbrowser/torbrowser.exe

    • Size

      694.2MB

    • MD5

      ac3699061b05b673b7cbfc7ac2445fb2

    • SHA1

      b6fafff988d361f2d25c873763c6e256224e7014

    • SHA256

      320366ee8ce3567531042c22aad8b29bc6fb29a91ce091c627faa3b8395ec533

    • SHA512

      9357aec09cc275c4c24dc0949845984d65914122635e0695e5c8d69a782fe9530cc48a93bc2850af69c16f6cd3ec1cc87f49743a639dc54d85fdaa212a652358

    • SSDEEP

      12288:0ZqM+DLDfcPSlUWFmFsZDTepju/5bHCZjtio:0ZGDLjg1xuZDTR5bHCe

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks