General

  • Target

    file.exe

  • Size

    406KB

  • Sample

    230106-hkr7vaef43

  • MD5

    4380d3ee542a4df5a678fcc4816cdbaf

  • SHA1

    ed523359a06ed18eebc1503873e02f8da70ec75e

  • SHA256

    7b9c40a3342d37de39a477b16320a18911ddcea823044b4bc3a6a436666a9282

  • SHA512

    6d65357694fc146a9f0ee1f5c76501d8bdfbaf4a81f4cd126da3f0cbb55cf3cf63af9ad7cc68e7e2ac9784ce2f114906df7181bb184c18a2fa76a510277718bd

  • SSDEEP

    6144:VRL7aaYLTiTK5wu/IpCXlr+kze0UfP37XhdWKQs6no:VR/aadW6qIpCXZ+30IP7XbbSo

Malware Config

Extracted

Family

vidar

Version

1.8

Botnet

24

C2

https://t.me/year2023start

https://steamcommunity.com/profiles/76561199467421923

Attributes
  • profile_id

    24

Targets

    • Target

      file.exe

    • Size

      406KB

    • MD5

      4380d3ee542a4df5a678fcc4816cdbaf

    • SHA1

      ed523359a06ed18eebc1503873e02f8da70ec75e

    • SHA256

      7b9c40a3342d37de39a477b16320a18911ddcea823044b4bc3a6a436666a9282

    • SHA512

      6d65357694fc146a9f0ee1f5c76501d8bdfbaf4a81f4cd126da3f0cbb55cf3cf63af9ad7cc68e7e2ac9784ce2f114906df7181bb184c18a2fa76a510277718bd

    • SSDEEP

      6144:VRL7aaYLTiTK5wu/IpCXlr+kze0UfP37XhdWKQs6no:VR/aadW6qIpCXZ+30IP7XbbSo

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

3
T1005

Tasks