General

  • Target

    file.exe

  • Size

    2.7MB

  • Sample

    230209-jvej6sbb78

  • MD5

    d7d08069ca5131d2f153a3a9b60455ff

  • SHA1

    4655fd1d0ab47cd046a8043ed8c3dc2a87c0d5a4

  • SHA256

    44f6100a2d95f01fb7e692367928f9df629c556680bc74fe45011482184c8b61

  • SHA512

    fb6e0aabc699097c4fad820ece0ad9d0ab14d319b18e214e2ce753b7b8c6a6e1574b9fffc7b9bc3afb2935ea0d29fb67bca628707836d937355ba0dcfe78965a

  • SSDEEP

    49152:HCSHvx8vQiFUYisfslgff2KWF+xdguj67gOJLiQiHfsdbpB+oYa1+e:HCSHZy/UY1klTzF6dpXOgQi/a7+Ne

Malware Config

Extracted

Family

vidar

Version

2.4

Botnet

589

Attributes
  • profile_id

    589

Targets

    • Target

      file.exe

    • Size

      2.7MB

    • MD5

      d7d08069ca5131d2f153a3a9b60455ff

    • SHA1

      4655fd1d0ab47cd046a8043ed8c3dc2a87c0d5a4

    • SHA256

      44f6100a2d95f01fb7e692367928f9df629c556680bc74fe45011482184c8b61

    • SHA512

      fb6e0aabc699097c4fad820ece0ad9d0ab14d319b18e214e2ce753b7b8c6a6e1574b9fffc7b9bc3afb2935ea0d29fb67bca628707836d937355ba0dcfe78965a

    • SSDEEP

      49152:HCSHvx8vQiFUYisfslgff2KWF+xdguj67gOJLiQiHfsdbpB+oYa1+e:HCSHZy/UY1klTzF6dpXOgQi/a7+Ne

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Loads dropped DLL

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks