General

  • Target

    cpu-z_setup.zip.zip

  • Size

    436KB

  • Sample

    230207-skmx8sfe5x

  • MD5

    d3355a196d0e8b69a92223556b97a3d7

  • SHA1

    9f3f1d6829762d85feeab45dca9f45364002d109

  • SHA256

    e62b103abd2ad2b4b835ded9d7d1a70e6500f3d79ee0ac4cf38dfef566e08bb6

  • SHA512

    8c1fba51f1b255e5405c9e2d30ee542337db7572826aeaa02ebf7c9c4fc2905657719baa4e80dd924eb2361fcf5fc02a780b6ee292dd8ac557eb52e4e740e27e

  • SSDEEP

    12288:NNl0UGmcS+cHEQA4LSBP2rQkr4wcUfLEVpnnDiO:NzkmXHEGLSBP2kC9c8+pnnX

Malware Config

Extracted

Family

vidar

Version

2.3

Botnet

698

C2

https://t.me/mantarlars

https://steamcommunity.com/profiles/76561199474840123

Attributes
  • profile_id

    698

Targets

    • Target

      cpu-z_setup.exe

    • Size

      294.7MB

    • MD5

      091693913d3cba2023dd37fbdb9e8e36

    • SHA1

      c83182954915d4126dbd702e3cdcbcaa66999184

    • SHA256

      72d25540d3919e2ea7226deb8434c997f6044004a389b220748659a09a7f296e

    • SHA512

      9ce6c17ed444c55129e2183c50a7d59736a88b0931af3f9a959e39338b5efedfe36135703174031abbd7588068d65aba84da60b37eeddc500da1f6de20cb9d5c

    • SSDEEP

      12288:OT6lJ1fDwWiqE3wpGtb6RbivgVBhNbiYW:BlJ1MNqE36GSivgDvbiY

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks