General

  • Target

    file.exe

  • Size

    2.1MB

  • Sample

    230108-y4fadsab4w

  • MD5

    e52f5370a68e1ee7b5f24b708924025b

  • SHA1

    bf920f1fe420f1c8dc8dba7112f1b57bf0d6dfb7

  • SHA256

    75fcb5d94124e7f3d099d6ac35a1af401bd52d68d6480a231171ae3b4833688a

  • SHA512

    7a2245652656888ec46a4a081aaa52ca86723b6d251059882b756fd0b7c8b0a576ad29c0b46fe3706a40d680c3940f3cadbd3716de98066b64b0b904fb624286

  • SSDEEP

    49152:B61lu6RZizQwhPuMaWFVCInTda0xW7hl8A:gG6KQwh2Mao9w+W7DZ

Malware Config

Extracted

Family

vidar

Version

1.8

Botnet

641

C2

https://t.me/year2023start

https://steamcommunity.com/profiles/76561199467421923

Attributes
  • profile_id

    641

Targets

    • Target

      file.exe

    • Size

      2.1MB

    • MD5

      e52f5370a68e1ee7b5f24b708924025b

    • SHA1

      bf920f1fe420f1c8dc8dba7112f1b57bf0d6dfb7

    • SHA256

      75fcb5d94124e7f3d099d6ac35a1af401bd52d68d6480a231171ae3b4833688a

    • SHA512

      7a2245652656888ec46a4a081aaa52ca86723b6d251059882b756fd0b7c8b0a576ad29c0b46fe3706a40d680c3940f3cadbd3716de98066b64b0b904fb624286

    • SSDEEP

      49152:B61lu6RZizQwhPuMaWFVCInTda0xW7hl8A:gG6KQwh2Mao9w+W7DZ

    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Loads dropped DLL

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks