General

  • Target

    4f4236a00072d3b2e9688c57aef204295315e1e56a53c134e44d037e602a1f23

  • Size

    324KB

  • Sample

    230104-vvsycacd3x

  • MD5

    c94ea4e7afee3726d5810ec1a69a52ec

  • SHA1

    50c133f9382de69fcd14143c17fbd216c5566ddc

  • SHA256

    5fd7779e9ad398e9fc18ad65ee71d5b1d5de8671a1f9fc382f31fc520b05aabe

  • SHA512

    d6bac77bc3564a78cf167ea8aa9992d2814b972a3c55030e9529640bede054addb5e7f869c4c11cdf62bf8e6ebe853d8ac86c5724a94788d7f7a19e8f8273a4f

  • SSDEEP

    6144:pS9jlhoas5ZRmDhjb+3QU7lCu9hyvsICwsYK9hx41uh2pi8Ba:pmjlhb8/obilP9hGYxrdZ

Malware Config

Extracted

Family

vidar

Version

1.8

Botnet

24

C2

https://t.me/year2023start

https://steamcommunity.com/profiles/76561199467421923

Attributes
  • profile_id

    24

Targets

    • Target

      4f4236a00072d3b2e9688c57aef204295315e1e56a53c134e44d037e602a1f23

    • Size

      460KB

    • MD5

      dd9b261370d38e19c041e529ce3c674b

    • SHA1

      747dd0c3b31ff50fc0b0fc0ce2a269426e81d2c0

    • SHA256

      4f4236a00072d3b2e9688c57aef204295315e1e56a53c134e44d037e602a1f23

    • SHA512

      6171896b75be237d9d85c1099d665ad516fcd7bee560bdf19b489f86a994660b61977fc46b17b27ea6df50003573e7aed9be4d67de741bfcaffdbaa1fed88930

    • SSDEEP

      6144:dVNdLwz3ztcOqMvJGs5ZRmDhjb+3QU7lsu9hyvsIg5oxupmL/7FgrVjT:Hf0TzFG8/obilx9h8IoxupmL/Z

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks