General

  • Target

    193TIuetnayqZtaKBfkSOsoCtZH.exe

  • Size

    1.5MB

  • Sample

    230207-1p4esafc2v

  • MD5

    f9c4577f86d986aa744d91756c5bc24a

  • SHA1

    e30fb3c60b02d112c30a4eedecd0e3fa6da465f8

  • SHA256

    67dcfee9df0940fa2fbef69b49d94d79a845ed6d7e96c2a0d94a5a0bf4b5b297

  • SHA512

    69f01dfc93336440f1e7aca8c86872292467ba06988f42abea6c183994c03be44747cc427f5b611159f7b88ea1cb4f550f5e1fba6174e5aebaee8abc1c402f2d

  • SSDEEP

    24576:wChlZbdfawxOiBcqz2Quvlu9gz3dOsgkT6xQ7dlFLz49b+:PLdJT7z2xvluK4sgkT6YbFLG+

Malware Config

Extracted

Family

vidar

Version

2.4

Botnet

682

Attributes
  • profile_id

    682

Targets

    • Target

      193TIuetnayqZtaKBfkSOsoCtZH.exe

    • Size

      1.5MB

    • MD5

      f9c4577f86d986aa744d91756c5bc24a

    • SHA1

      e30fb3c60b02d112c30a4eedecd0e3fa6da465f8

    • SHA256

      67dcfee9df0940fa2fbef69b49d94d79a845ed6d7e96c2a0d94a5a0bf4b5b297

    • SHA512

      69f01dfc93336440f1e7aca8c86872292467ba06988f42abea6c183994c03be44747cc427f5b611159f7b88ea1cb4f550f5e1fba6174e5aebaee8abc1c402f2d

    • SSDEEP

      24576:wChlZbdfawxOiBcqz2Quvlu9gz3dOsgkT6xQ7dlFLz49b+:PLdJT7z2xvluK4sgkT6YbFLG+

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks