General

  • Target

    922260358cff0b48e0098db3eb36065cfae990c0bddb75b21e2fa8ed9c1edb3e

  • Size

    406KB

  • Sample

    230106-gfewaaed32

  • MD5

    ffeb3e7f7e1679b7b91047c185d19e32

  • SHA1

    9f0bf7f8c0c90424a00e2bdea3df797409c15930

  • SHA256

    922260358cff0b48e0098db3eb36065cfae990c0bddb75b21e2fa8ed9c1edb3e

  • SHA512

    c62a0788fcc63770c0c89e97665723ed7561c5bdaf30d3d0fed54eda3485435ab43c1121b07e2e44fa79f3201f2a0caca5db9f6fecb3a8b3e6b1671b2bdac5ef

  • SSDEEP

    6144:mSLOoKjpEpCOnZPgBKx1HdwnL2a35mphL3Oq9dWKQyuo:mSSoKjpEJ3CL2a32hBbRuo

Malware Config

Extracted

Family

vidar

Version

1.8

Botnet

24

C2

https://t.me/year2023start

https://steamcommunity.com/profiles/76561199467421923

Attributes
  • profile_id

    24

Targets

    • Target

      922260358cff0b48e0098db3eb36065cfae990c0bddb75b21e2fa8ed9c1edb3e

    • Size

      406KB

    • MD5

      ffeb3e7f7e1679b7b91047c185d19e32

    • SHA1

      9f0bf7f8c0c90424a00e2bdea3df797409c15930

    • SHA256

      922260358cff0b48e0098db3eb36065cfae990c0bddb75b21e2fa8ed9c1edb3e

    • SHA512

      c62a0788fcc63770c0c89e97665723ed7561c5bdaf30d3d0fed54eda3485435ab43c1121b07e2e44fa79f3201f2a0caca5db9f6fecb3a8b3e6b1671b2bdac5ef

    • SSDEEP

      6144:mSLOoKjpEpCOnZPgBKx1HdwnL2a35mphL3Oq9dWKQyuo:mSSoKjpEJ3CL2a32hBbRuo

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks