General

  • Target

    file.exe

  • Size

    2.2MB

  • Sample

    230423-nfezlsda52

  • MD5

    e3af7d1d0cf8fdb64fd1325c5bdee3ac

  • SHA1

    9992ef93cf63ca7b2dbf4f53e6e7d3da523c0607

  • SHA256

    fd5e477a5ef24773b8ed6e2acce77583e557a7def1eaf3ac6e51b71e4d599a65

  • SHA512

    a2b139c9ddaec1d68a8650ed42c7639d72e3cf7755a04a4ddabc49164898282c595724f39cb61727058d16e8a4ea263364b625dcc0ba8dd5b32459715e9d1e76

  • SSDEEP

    24576:m36P4vcvVN9gMWsvvS3OcZkQVj2hpyMkyj7NHlKaOKdlsBT5Q6S:m3d0tN6GS3bkQOMvynKaIe6S

Malware Config

Extracted

Family

vidar

Version

3.5

Botnet

1ba4b1695fdd1c995863750c0e6924af

C2

https://steamcommunity.com/profiles/76561199497218285

https://t.me/tg_duckworld

Attributes
  • profile_id_v2

    1ba4b1695fdd1c995863750c0e6924af

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Vivaldi/3.7

Targets

    • Target

      file.exe

    • Size

      2.2MB

    • MD5

      e3af7d1d0cf8fdb64fd1325c5bdee3ac

    • SHA1

      9992ef93cf63ca7b2dbf4f53e6e7d3da523c0607

    • SHA256

      fd5e477a5ef24773b8ed6e2acce77583e557a7def1eaf3ac6e51b71e4d599a65

    • SHA512

      a2b139c9ddaec1d68a8650ed42c7639d72e3cf7755a04a4ddabc49164898282c595724f39cb61727058d16e8a4ea263364b625dcc0ba8dd5b32459715e9d1e76

    • SSDEEP

      24576:m36P4vcvVN9gMWsvvS3OcZkQVj2hpyMkyj7NHlKaOKdlsBT5Q6S:m3d0tN6GS3bkQOMvynKaIe6S

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks