General

  • Target

    file.exe

  • Size

    378KB

  • Sample

    230108-vrdz1seb65

  • MD5

    d04f810bfbbe317de56b3312dbf9a82d

  • SHA1

    acdab704ca02ce5c466b2586e101002d319c8ba6

  • SHA256

    723f833a06244d7601591949fae724e0176ca30ae9582f86848d20ffe0e33b77

  • SHA512

    22865b8dbd84fd905f770f81afa63ac730f5c4dcb73a825cb595d3a9abb7bd07974a778eccc0fc5a2593e523c39a6bb679c3420b817b3d831e9c3dceefe5698c

  • SSDEEP

    6144:HCLkrJ7DaNcv+6vZQVu/1bDD1NhEXJXydSoOuNl:HCgN7DaN0bvWE1bDThEXJXyzJl

Malware Config

Extracted

Family

vidar

Version

1.8

Botnet

24

C2

https://t.me/year2023start

https://steamcommunity.com/profiles/76561199467421923

Attributes
  • profile_id

    24

Targets

    • Target

      file.exe

    • Size

      378KB

    • MD5

      d04f810bfbbe317de56b3312dbf9a82d

    • SHA1

      acdab704ca02ce5c466b2586e101002d319c8ba6

    • SHA256

      723f833a06244d7601591949fae724e0176ca30ae9582f86848d20ffe0e33b77

    • SHA512

      22865b8dbd84fd905f770f81afa63ac730f5c4dcb73a825cb595d3a9abb7bd07974a778eccc0fc5a2593e523c39a6bb679c3420b817b3d831e9c3dceefe5698c

    • SSDEEP

      6144:HCLkrJ7DaNcv+6vZQVu/1bDD1NhEXJXydSoOuNl:HCgN7DaN0bvWE1bDThEXJXyzJl

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

3
T1005

Command and Control

Web Service

1
T1102

Tasks