Resubmissions

04-02-2023 17:26

230204-vzyz6ahc5s 10

General

  • Target

    Voicemod crack.exe

  • Size

    761.7MB

  • Sample

    230204-vzyz6ahc5s

  • MD5

    05242383b19c459e4ac2d76f823a6602

  • SHA1

    12d531a3a39bf0571051e88410707216b72924bf

  • SHA256

    22bb6a288e7d0f7da2f0f210619c8da124890f3c6d04b8ed86c07bc655a9b18e

  • SHA512

    85444aba6dc8cbf2b9f7344c8b684ba6e16cd2aa1bf05746e279c73b4025673a7374b6f5b24662c92d401aeab76c9fe8b7b1fc26740f032c1ce863305390bde0

  • SSDEEP

    6144:c9pdgQXdMITwYr19KY2oSQ7e8b5Y+3d0LPSYlhZGfq82weM9xKUagjZbafgUB3XK:c9pdgSxr19K/H18HdpYbcfpFKSwguq

Malware Config

Extracted

Family

vidar

Version

2.3

Botnet

408

C2

https://t.me/mantarlars

https://steamcommunity.com/profiles/76561199474840123

Attributes
  • profile_id

    408

Targets

    • Target

      Voicemod crack.exe

    • Size

      761.7MB

    • MD5

      05242383b19c459e4ac2d76f823a6602

    • SHA1

      12d531a3a39bf0571051e88410707216b72924bf

    • SHA256

      22bb6a288e7d0f7da2f0f210619c8da124890f3c6d04b8ed86c07bc655a9b18e

    • SHA512

      85444aba6dc8cbf2b9f7344c8b684ba6e16cd2aa1bf05746e279c73b4025673a7374b6f5b24662c92d401aeab76c9fe8b7b1fc26740f032c1ce863305390bde0

    • SSDEEP

      6144:c9pdgQXdMITwYr19KY2oSQ7e8b5Y+3d0LPSYlhZGfq82weM9xKUagjZbafgUB3XK:c9pdgSxr19K/H18HdpYbcfpFKSwguq

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks