General

  • Target

    29dc4071c3232c5cd82186be9155bd7288bc4eb4013159ceaed06da36ef29607.zip

  • Size

    660KB

  • Sample

    221219-wyrecsag3y

  • MD5

    7ee2ba308715e0e500665413c626b233

  • SHA1

    af6efdff30c2b1422311627967f4e9252bc7b2c1

  • SHA256

    cec06653b437744d9f93e6ef2567f1af826ad32aac9aa82b66b9ea16e9cdfc04

  • SHA512

    2ec8a8bf913f3489f7c93ef3b56fe194c31121c1582dc6a5290aaefa02d2cc38fec3e7e52ebf90f000651f15801421438930cf89dd682f6e8c3e9e124f241ce0

  • SSDEEP

    12288:qufcEunvj7FCzRwWk75VuBTVZdp8FqjN2RlYJanB0L+tv31MyYBj4xaZ:ldCvj7FSPkdVwTJpsdlHlZ31YPZ

Score
10/10

Malware Config

Extracted

Family

vidar

Version

55.3

Botnet

1375

C2

https://t.me/slivetalks

https://c.im/@xinibin420

Attributes
  • profile_id

    1375

Targets

    • Target

      29dc4071c3232c5cd82186be9155bd7288bc4eb4013159ceaed06da36ef29607.exe

    • Size

      1.4MB

    • MD5

      c1d4a46772da836ea329a74d42aa9baf

    • SHA1

      19326d11451447f823b637424b8ebb856d2508a8

    • SHA256

      29dc4071c3232c5cd82186be9155bd7288bc4eb4013159ceaed06da36ef29607

    • SHA512

      4bd8ad1f24d3eade753bfda80a2697668bdd46a406e87e963cc8cd24039c97e43ef0f23e44965b8b20e0d5319c076e2a606b8edf6f2c0db6a51f9f252339d866

    • SSDEEP

      24576:54+4avH3vkdECpW//MUx/XEyoY6YifYmiXMDZdsAdcLrHK2Kd7vUCCHZgjnV4Kep:K+4CH38dtpy/M0fEMNgqmngtwTg

    Score
    10/10
    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Tasks