General

  • Target

    fdfdfdf.txt

  • Size

    7KB

  • Sample

    230401-zqlexsea91

  • MD5

    e0e398ab9fc85af4782e59c9ebdb0aff

  • SHA1

    528de232534f4fa431642154349e6c8814c67895

  • SHA256

    edaefe4989655651df0e69e59db1023ae6c93077e847017aebb04722dcc79635

  • SHA512

    74af44a1c3754af24cb26c191aa7d2ba3684ee6ef2454de8e177d715c3ac54681b401e026ae1928839e992be25d5412fb70a8255255c7141c48174f92a43e555

  • SSDEEP

    12:8uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuY:X

Malware Config

Extracted

Family

vidar

Version

3.2

Botnet

f5594a940041074375a00887e616a9d7

C2

https://steamcommunity.com/profiles/76561199482806358

https://t.me/tabootalks

Attributes
  • profile_id_v2

    f5594a940041074375a00887e616a9d7

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36 OPR/91.0.4516.79

Targets

    • Target

      fdfdfdf.txt

    • Size

      7KB

    • MD5

      e0e398ab9fc85af4782e59c9ebdb0aff

    • SHA1

      528de232534f4fa431642154349e6c8814c67895

    • SHA256

      edaefe4989655651df0e69e59db1023ae6c93077e847017aebb04722dcc79635

    • SHA512

      74af44a1c3754af24cb26c191aa7d2ba3684ee6ef2454de8e177d715c3ac54681b401e026ae1928839e992be25d5412fb70a8255255c7141c48174f92a43e555

    • SSDEEP

      12:8uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuY:X

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks