General

  • Target

    10693518407261cb6d1cae5bd3ad6aa3309e0a6ac1170cc9592a3ed29e3303b3

  • Size

    473KB

  • Sample

    230412-x19t6afh5y

  • MD5

    3ec42428dc1b2a74ebc6bcbb3535e1c6

  • SHA1

    ef661756a0e227099c3f4605f2c40c40415ee0ca

  • SHA256

    10693518407261cb6d1cae5bd3ad6aa3309e0a6ac1170cc9592a3ed29e3303b3

  • SHA512

    98d05c60f0d92b04b6cc7638469e0e2793b40551afdd64c11f802f611bf8ddbcc54ea3ca6f75f558496905e87c8779d132cbe7e6cc9408727ac832451dc574ca

  • SSDEEP

    6144:g2T9Vzdm/R7a6I8eRaQEXNii4fbCcRerYLjGwAVbbSSBHxe4Y3hTxT9UTtCV+E:g2Dpf6ILxE96CVrKGjWSBHjyhdTQCVr

Malware Config

Extracted

Family

vidar

Version

3.4

Botnet

e749025c61b2caca10aa829a9e1a65a1

C2

https://steamcommunity.com/profiles/76561199494593681

https://t.me/auftriebs

Attributes
  • profile_id_v2

    e749025c61b2caca10aa829a9e1a65a1

  • user_agent

    Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0

Extracted

Family

laplas

C2

http://185.106.92.74

Attributes
  • api_key

    bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396

Targets

    • Target

      10693518407261cb6d1cae5bd3ad6aa3309e0a6ac1170cc9592a3ed29e3303b3

    • Size

      473KB

    • MD5

      3ec42428dc1b2a74ebc6bcbb3535e1c6

    • SHA1

      ef661756a0e227099c3f4605f2c40c40415ee0ca

    • SHA256

      10693518407261cb6d1cae5bd3ad6aa3309e0a6ac1170cc9592a3ed29e3303b3

    • SHA512

      98d05c60f0d92b04b6cc7638469e0e2793b40551afdd64c11f802f611bf8ddbcc54ea3ca6f75f558496905e87c8779d132cbe7e6cc9408727ac832451dc574ca

    • SSDEEP

      6144:g2T9Vzdm/R7a6I8eRaQEXNii4fbCcRerYLjGwAVbbSSBHxe4Y3hTxT9UTtCV+E:g2Dpf6ILxE96CVrKGjWSBHjyhdTQCVr

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks