General

  • Target

    c8912fe8e08b4e0947b0c56201485581.bin

  • Size

    3.8MB

  • Sample

    230327-cnpcgabc37

  • MD5

    6b92a19a4e497b597012fff34af29913

  • SHA1

    c128e0c9efd25b81b355bc6d9f2dadf93b9b0b7f

  • SHA256

    017174414fecd8358abc4568243f2731ac37ec1a42c6429939983799e9a9c98d

  • SHA512

    c299fdca649d84e37a6f29874e9fb33877bc54756250b439fd8b3fd8443eb162b58e557a4820f3eee773b26c8d288ced11d0c764a54ea567ff342c54b2dfc86c

  • SSDEEP

    98304:sKdSaidbpJpQnyxi5+gqdkkWUTJviI8CDqGjOlGa207D:sKd4F3sV3q6kHVEG/y

Malware Config

Extracted

Family

vidar

Version

3.1

Botnet

20f95c4f85151b21c48a8766fbd2d32d

C2

https://steamcommunity.com/profiles/76561199472266392

https://t.me/tabootalks

http://135.181.26.183:80

Attributes
  • profile_id_v2

    20f95c4f85151b21c48a8766fbd2d32d

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36 OPR/91.0.4516.79

Targets

    • Target

      9ee64b8dc1af383e25ca542f9ede7a8b649c8b1477012c39fca179637fec289d.exe

    • Size

      4.0MB

    • MD5

      c8912fe8e08b4e0947b0c56201485581

    • SHA1

      2699d925e8a1708e86afac0f65d8e4797126fe90

    • SHA256

      9ee64b8dc1af383e25ca542f9ede7a8b649c8b1477012c39fca179637fec289d

    • SHA512

      c6eca8af85ceeec0a0221a067196bb17ed09bb00931371f79d262d53efcff405c38ea93bb9189d791eb3b358c121a9ec4475f754d1ea92045deff2de0426b70f

    • SSDEEP

      98304:wqjAMzqBA3pR8BG0Zu+wExyDfpvo0fc/jc/kA3:w4pzqCCBG05w1DRATct3

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks