General

  • Target

    a32ee68cab7021ae6aa6e16e8b70a9b3.exe

  • Size

    322KB

  • Sample

    230221-rne65aha3s

  • MD5

    a32ee68cab7021ae6aa6e16e8b70a9b3

  • SHA1

    22e86ec447a074098e19e3f686c373dc53aaf9f3

  • SHA256

    76d3b8781abaea750616e4993cdc85696fb12b5d0afb7ef66853f604d141758f

  • SHA512

    a163adf92417463344a491cce7928e3c2a2cee27684f6b5bdd7a17a532fade88fab167e98d425dd8cba49cfcd2e3f1709f986829b9b7a7e4131887882a612ae1

  • SSDEEP

    6144:4SQDLbYaw8NPIXh+FjImhk0oV1a09pvIVrh20HpDPIXbwLvw:0D3Yj8ZDFlhkDV17Arh7BIcLvw

Malware Config

Extracted

Family

vidar

Version

2.6

Botnet

19

Attributes
  • profile_id

    19

Targets

    • Target

      a32ee68cab7021ae6aa6e16e8b70a9b3.exe

    • Size

      322KB

    • MD5

      a32ee68cab7021ae6aa6e16e8b70a9b3

    • SHA1

      22e86ec447a074098e19e3f686c373dc53aaf9f3

    • SHA256

      76d3b8781abaea750616e4993cdc85696fb12b5d0afb7ef66853f604d141758f

    • SHA512

      a163adf92417463344a491cce7928e3c2a2cee27684f6b5bdd7a17a532fade88fab167e98d425dd8cba49cfcd2e3f1709f986829b9b7a7e4131887882a612ae1

    • SSDEEP

      6144:4SQDLbYaw8NPIXh+FjImhk0oV1a09pvIVrh20HpDPIXbwLvw:0D3Yj8ZDFlhkDV17Arh7BIcLvw

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

3
T1005

Tasks