General

  • Target

    file.exe

  • Size

    3.9MB

  • Sample

    230519-l571ksga7y

  • MD5

    9d01a39ac6f97e8d6b0ebceb2c76e931

  • SHA1

    730640fdf1a2d4705da7f4f9375f5a96ad2543e2

  • SHA256

    0ac69869d49dd9bcbf25346a6887ad5a510079a9e12ecae1e67af361127e44e1

  • SHA512

    5686d64aa019a77d0653f8204474d34f5437714ea933ee0c67265c707af6a7f9f31b6b8ae77d3af3d37ba9c3d119c9f2e93e4e5d6cea07a00b338388402dab68

  • SSDEEP

    49152:gDOWkK1DejuIIojMjEa8+jLsoJEsmVesn9KenJVI2B9KU0hCRDPPp8PPaaymgq2h:gpQfyE/KLs3Ve4JVfO3hMjxkPV9yHqd

Malware Config

Extracted

Family

vidar

Version

3.9

Botnet

837dd115ef260ea7afce43e26cba4f62

C2

https://steamcommunity.com/profiles/76561199263069598

https://t.me/cybehost

Attributes
  • profile_id_v2

    837dd115ef260ea7afce43e26cba4f62

  • user_agent

    Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.7 (like Gecko) (Debian)

Targets

    • Target

      file.exe

    • Size

      3.9MB

    • MD5

      9d01a39ac6f97e8d6b0ebceb2c76e931

    • SHA1

      730640fdf1a2d4705da7f4f9375f5a96ad2543e2

    • SHA256

      0ac69869d49dd9bcbf25346a6887ad5a510079a9e12ecae1e67af361127e44e1

    • SHA512

      5686d64aa019a77d0653f8204474d34f5437714ea933ee0c67265c707af6a7f9f31b6b8ae77d3af3d37ba9c3d119c9f2e93e4e5d6cea07a00b338388402dab68

    • SSDEEP

      49152:gDOWkK1DejuIIojMjEa8+jLsoJEsmVesn9KenJVI2B9KU0hCRDPPp8PPaaymgq2h:gpQfyE/KLs3Ve4JVfO3hMjxkPV9yHqd

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks