General

  • Target

    3235d6bdcf964ed58a67049341a5aefda696011a8bc8f29304c8592f68678191

  • Size

    471KB

  • Sample

    230415-gj8yjaeg3s

  • MD5

    5377b42495975d5641508a25dc12c254

  • SHA1

    7ea4cc5840b3b15367c43542eda44a9017964d38

  • SHA256

    3235d6bdcf964ed58a67049341a5aefda696011a8bc8f29304c8592f68678191

  • SHA512

    c2c40842a03c196f31201e0b52566e51e68795dd36f676f125fbe1b8039e3a97087a550da80e69fd9593ba2350c000fbe88876cb3f308ef6dd309ca04f6c8663

  • SSDEEP

    6144:p2dOW5OqXwk7iAdg1VwNM6CJnGpo+YYlmOpvBnjbjbmmoMR9VBTi:p2EWMUwk7iyAwW6hYYkOpZnjbmmxVI

Malware Config

Extracted

Family

vidar

Version

3.4

Botnet

e749025c61b2caca10aa829a9e1a65a1

C2

https://steamcommunity.com/profiles/76561199494593681

https://t.me/auftriebs

Attributes
  • profile_id_v2

    e749025c61b2caca10aa829a9e1a65a1

  • user_agent

    Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0

Extracted

Family

laplas

C2

http://185.106.92.74

Attributes
  • api_key

    bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396

Targets

    • Target

      3235d6bdcf964ed58a67049341a5aefda696011a8bc8f29304c8592f68678191

    • Size

      471KB

    • MD5

      5377b42495975d5641508a25dc12c254

    • SHA1

      7ea4cc5840b3b15367c43542eda44a9017964d38

    • SHA256

      3235d6bdcf964ed58a67049341a5aefda696011a8bc8f29304c8592f68678191

    • SHA512

      c2c40842a03c196f31201e0b52566e51e68795dd36f676f125fbe1b8039e3a97087a550da80e69fd9593ba2350c000fbe88876cb3f308ef6dd309ca04f6c8663

    • SSDEEP

      6144:p2dOW5OqXwk7iAdg1VwNM6CJnGpo+YYlmOpvBnjbjbmmoMR9VBTi:p2EWMUwk7iyAwW6hYYkOpZnjbmmxVI

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks