General

  • Target

    MDE_File_Sample_4a41fa1a182916d5790aa2071106b3441d64468d.zip

  • Size

    294KB

  • Sample

    230330-rdx9ysed5z

  • MD5

    4dad4c0865b63f591eec02fa35b75565

  • SHA1

    6b748170e1c607168e4d92ee3e650ec413dfd1be

  • SHA256

    715de17a10597bf06d9f0ed51d01564c6a1ad43afc93b74753d044c5b6001c15

  • SHA512

    73c91225fcd69025d8ab0a3938a84c03ecd7eae8e28191d4b9183ed8d006db581c62744aac268db4105868903dcbe5d82af3de986d42b77a06de3319af8694fa

  • SSDEEP

    6144:QP1zoiyBbLc3uNey3fypKKyOFPMMgO+XUSjQzPqgPxJLrjsDy:QqiyBvRNey3fAXeBNwoy

Malware Config

Extracted

Family

vidar

Version

3.2

Botnet

5df88deb5dde677ba658b77ad5f60248

C2

https://steamcommunity.com/profiles/76561199489580435

https://t.me/tabootalks

Attributes
  • profile_id_v2

    5df88deb5dde677ba658b77ad5f60248

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36 OPR/91.0.4516.79

Targets

    • Target

      build2.exe

    • Size

      416KB

    • MD5

      aa18968e6cfbdc382ada6a3ed2852085

    • SHA1

      4a41fa1a182916d5790aa2071106b3441d64468d

    • SHA256

      c165c8db38ef8dd8c33d103b5ee78e9ddafd8081ff0c7c035fa5251f970e6cfb

    • SHA512

      8ffdacca2b003438fd4874e7c88beedb6ad8cf9cd5b36fda5907751e06a85a829e7d9ce7335fb59590462f78054722bccba511b21db838368c661d993000a845

    • SSDEEP

      6144:2tSK7xCXvZt/cuPXL/G1a5i7VHUOepEXqZCbt+sEtDDTS:2tSKtavZLPrCa5YHUjpdQbIzS

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks