General

  • Target

    b8d15d856905852c376d2abfb4999d128e92a364366abd2c3a13886407b9c6e0

  • Size

    471KB

  • Sample

    230412-nsw4naca22

  • MD5

    7726ff8db0d30ab03e9548ba7fe27446

  • SHA1

    6240309f1205990256778c7d1951a5b095806931

  • SHA256

    b8d15d856905852c376d2abfb4999d128e92a364366abd2c3a13886407b9c6e0

  • SHA512

    8faeffc97b9e12d5584c532eae7a62a1ff12edf9dc43c8c058c6bdbb4c367be1b47a6ee8da0932f4301f161de3aabb16b2300f436290dddbd5186e850770d19a

  • SSDEEP

    12288:DcZT8vz5dXe8c8j4i5RleOkDT6s9Qwze:DOT6k8siXtk/JQd

Malware Config

Extracted

Family

vidar

Version

3.4

Botnet

e749025c61b2caca10aa829a9e1a65a1

C2

https://steamcommunity.com/profiles/76561199494593681

https://t.me/auftriebs

Attributes
  • profile_id_v2

    e749025c61b2caca10aa829a9e1a65a1

  • user_agent

    Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0

Extracted

Family

laplas

C2

http://185.106.92.74

Attributes
  • api_key

    bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396

Targets

    • Target

      b8d15d856905852c376d2abfb4999d128e92a364366abd2c3a13886407b9c6e0

    • Size

      471KB

    • MD5

      7726ff8db0d30ab03e9548ba7fe27446

    • SHA1

      6240309f1205990256778c7d1951a5b095806931

    • SHA256

      b8d15d856905852c376d2abfb4999d128e92a364366abd2c3a13886407b9c6e0

    • SHA512

      8faeffc97b9e12d5584c532eae7a62a1ff12edf9dc43c8c058c6bdbb4c367be1b47a6ee8da0932f4301f161de3aabb16b2300f436290dddbd5186e850770d19a

    • SSDEEP

      12288:DcZT8vz5dXe8c8j4i5RleOkDT6s9Qwze:DOT6k8siXtk/JQd

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks