General

  • Target

    file.exe

  • Size

    416KB

  • Sample

    230131-s2f61sgh69

  • MD5

    996a9afca7ebed4ce1ac3f22f2f8da51

  • SHA1

    bebfc60a7b1fa8e493a458d15331907233f0e928

  • SHA256

    a594a97b66c29d9128d7757f71650c91575f1f32033f4cc56b49e8f5e1d4cecf

  • SHA512

    e50ab67d9d87f0dc801553116c2fb09320d8aa7f5041abcc79260c1de956de2c711d868b1561081beec32e0f23523226de0dff8e9df83fff11ec64006984d7f1

  • SSDEEP

    6144:rkgYDLQMDGDJyzP+Bpitd5QHiIuTWuej7bwtRaamqMoI/wr8Mu:9QcLDJwyWGCIuTPGbzqME

Malware Config

Extracted

Family

vidar

Version

2.3

Botnet

813

C2

https://t.me/mantarlars

https://steamcommunity.com/profiles/76561199474840123

Attributes
  • profile_id

    813

Targets

    • Target

      file.exe

    • Size

      416KB

    • MD5

      996a9afca7ebed4ce1ac3f22f2f8da51

    • SHA1

      bebfc60a7b1fa8e493a458d15331907233f0e928

    • SHA256

      a594a97b66c29d9128d7757f71650c91575f1f32033f4cc56b49e8f5e1d4cecf

    • SHA512

      e50ab67d9d87f0dc801553116c2fb09320d8aa7f5041abcc79260c1de956de2c711d868b1561081beec32e0f23523226de0dff8e9df83fff11ec64006984d7f1

    • SSDEEP

      6144:rkgYDLQMDGDJyzP+Bpitd5QHiIuTWuej7bwtRaamqMoI/wr8Mu:9QcLDJwyWGCIuTPGbzqME

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Tasks