General

  • Target

    file.exe

  • Size

    392KB

  • Sample

    221227-kep7eahg3z

  • MD5

    db99a2e613fc448909216c84a3ddb142

  • SHA1

    447ba156daaf36b17ecda5db7a4552c0faf58443

  • SHA256

    20bc27ce3899bd504c6da266020188f0b8f33d5e582926c533e9543ed22e82f7

  • SHA512

    e47d9539deb84befa86d1dde914ff2b84aa7b8fd0cc156ef1e533a9f6f3d10e82df1cb6dccc219c953e02eb65ea400c896929f0104e625d1d1f2c9fc2da45bf6

  • SSDEEP

    12288:hmx6un2Gn+fw2dgXAB+LBS58xaxDPyrbA:Cn2Gn+fiXKMB08xaNPyrc

Malware Config

Extracted

Family

vidar

Version

1.7

Botnet

24

C2

https://t.me/robloxblackl

https://steamcommunity.com/profiles/76561199458928097

Attributes
  • profile_id

    24

Targets

    • Target

      file.exe

    • Size

      392KB

    • MD5

      db99a2e613fc448909216c84a3ddb142

    • SHA1

      447ba156daaf36b17ecda5db7a4552c0faf58443

    • SHA256

      20bc27ce3899bd504c6da266020188f0b8f33d5e582926c533e9543ed22e82f7

    • SHA512

      e47d9539deb84befa86d1dde914ff2b84aa7b8fd0cc156ef1e533a9f6f3d10e82df1cb6dccc219c953e02eb65ea400c896929f0104e625d1d1f2c9fc2da45bf6

    • SSDEEP

      12288:hmx6un2Gn+fw2dgXAB+LBS58xaxDPyrbA:Cn2Gn+fiXKMB08xaNPyrc

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks