General

  • Target

    setupfile2.8.1-truncated.exe

  • Size

    2.0MB

  • Sample

    230130-3erpcaeg8s

  • MD5

    d933f16c807e4e4ddb28d4257ba7599f

  • SHA1

    00fb91289acac5308020a880a1866363e96e0094

  • SHA256

    4dcd62b4caace67ea5ba7a98c98979999ce775168fc3d9f1e94c7ec2f46eb4cb

  • SHA512

    c6ef0af00c8a198aae3dd42b82d63ee76812c91aa531b4d6aa097d10423cbcb726688810bfa07c2bf144230d2b0fb930e234abab824aac87815bbb729db3624f

  • SSDEEP

    49152:8q6SQ9bJ24qRD1Wgi1SiXrTrhCcNRhix:oZJ2/RD1Wgi1SiTocNRhix

Malware Config

Extracted

Family

vidar

Version

2.3

Botnet

656

C2

https://t.me/mantarlars

https://steamcommunity.com/profiles/76561199474840123

Attributes
  • profile_id

    656

Targets

    • Target

      setupfile2.8.1-truncated.exe

    • Size

      2.0MB

    • MD5

      d933f16c807e4e4ddb28d4257ba7599f

    • SHA1

      00fb91289acac5308020a880a1866363e96e0094

    • SHA256

      4dcd62b4caace67ea5ba7a98c98979999ce775168fc3d9f1e94c7ec2f46eb4cb

    • SHA512

      c6ef0af00c8a198aae3dd42b82d63ee76812c91aa531b4d6aa097d10423cbcb726688810bfa07c2bf144230d2b0fb930e234abab824aac87815bbb729db3624f

    • SSDEEP

      49152:8q6SQ9bJ24qRD1Wgi1SiXrTrhCcNRhix:oZJ2/RD1Wgi1SiTocNRhix

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks