General

  • Target

    958ba9e54b932f13ab0ad3ed176a650ce42d2e695592af7cec7c1efce07b25ac

  • Size

    472KB

  • Sample

    230412-xg1gdafg3v

  • MD5

    3083b42ca069e5f0794203d62bd84a13

  • SHA1

    d4aa868b603b9e0e39613365e38391b5bed62998

  • SHA256

    958ba9e54b932f13ab0ad3ed176a650ce42d2e695592af7cec7c1efce07b25ac

  • SHA512

    cc904fd6c362502d48ca01e6e6efc3ed30cd78baf78e2976a0d782a3b1914950319be2f651ab550851ad1160bb18facae4f53375d56057e7aa07cd50fd680f7a

  • SSDEEP

    6144:gIhCud5/Qv9oo31uJXuM++kdh+bN32+LPx27T9HneAT9fPG9nJCV+E:gIEunQv9oo3XMn0sN3nE7lnBTMJCVr

Malware Config

Extracted

Family

vidar

Version

3.4

Botnet

e749025c61b2caca10aa829a9e1a65a1

C2

https://steamcommunity.com/profiles/76561199494593681

https://t.me/auftriebs

Attributes
  • profile_id_v2

    e749025c61b2caca10aa829a9e1a65a1

  • user_agent

    Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0

Extracted

Family

laplas

C2

http://185.106.92.74

Attributes
  • api_key

    bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396

Targets

    • Target

      958ba9e54b932f13ab0ad3ed176a650ce42d2e695592af7cec7c1efce07b25ac

    • Size

      472KB

    • MD5

      3083b42ca069e5f0794203d62bd84a13

    • SHA1

      d4aa868b603b9e0e39613365e38391b5bed62998

    • SHA256

      958ba9e54b932f13ab0ad3ed176a650ce42d2e695592af7cec7c1efce07b25ac

    • SHA512

      cc904fd6c362502d48ca01e6e6efc3ed30cd78baf78e2976a0d782a3b1914950319be2f651ab550851ad1160bb18facae4f53375d56057e7aa07cd50fd680f7a

    • SSDEEP

      6144:gIhCud5/Qv9oo31uJXuM++kdh+bN32+LPx27T9HneAT9fPG9nJCV+E:gIEunQv9oo3XMn0sN3nE7lnBTMJCVr

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks