Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    0f99eef3431f8f04eef23ccab335afcd7129e1ca69728ba2bfc929de3010e402.bin

  • Size

    688KB

  • Sample

    230511-w7gxaabd8z

  • MD5

    c9e2ee39f9899dcbb8b51de798971892

  • SHA1

    9104f6cd9b9fa5f7269ed70a8355fc553275bdd9

  • SHA256

    0f99eef3431f8f04eef23ccab335afcd7129e1ca69728ba2bfc929de3010e402

  • SHA512

    8beb681d70df085fe2b7a1ed5cc69850be87e4d3281b9560aafef1358d495af54b3a45f6b2a3b80c44ab6801d0788148b1bdb5005de24e405f5ae4466cd7dcd4

  • SSDEEP

    12288:ACxHDIAphovDRNKA4N058amG6JtR6wfTbTxwjfwxt:A2H0Apwnr4NuVqgowjfwx

Malware Config

Extracted

Family

vidar

Version

3.8

Botnet

cdb48fb567690db37648afd4e1d83137

C2

https://steamcommunity.com/profiles/76561198272578552

https://t.me/libpcre

Attributes
  • profile_id_v2

    cdb48fb567690db37648afd4e1d83137

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Vivaldi/3.7

Targets

    • Target

      0f99eef3431f8f04eef23ccab335afcd7129e1ca69728ba2bfc929de3010e402.bin

    • Size

      688KB

    • MD5

      c9e2ee39f9899dcbb8b51de798971892

    • SHA1

      9104f6cd9b9fa5f7269ed70a8355fc553275bdd9

    • SHA256

      0f99eef3431f8f04eef23ccab335afcd7129e1ca69728ba2bfc929de3010e402

    • SHA512

      8beb681d70df085fe2b7a1ed5cc69850be87e4d3281b9560aafef1358d495af54b3a45f6b2a3b80c44ab6801d0788148b1bdb5005de24e405f5ae4466cd7dcd4

    • SSDEEP

      12288:ACxHDIAphovDRNKA4N058amG6JtR6wfTbTxwjfwxt:A2H0Apwnr4NuVqgowjfwx

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks