General

  • Target

    90c4d8c8f396f66d9b556ab05344a8cd.exe

  • Size

    93KB

  • Sample

    230616-nc5e4aed3z

  • MD5

    90c4d8c8f396f66d9b556ab05344a8cd

  • SHA1

    4869f0a7a3a68f4638556e9df0eef34ea0fdc9d7

  • SHA256

    6ba3d50f87b4c2c81a8ab9247f2fafa6f4ec31d1f3acffbdb40a83ab351df9be

  • SHA512

    4d5a61a89f6e003b92f093385bd56f5d798ac73c1cc524b261a3ff704d251ef1cb450177404651b072feab954c94f617a88bdb55620920ac620c2c115d6b960f

  • SSDEEP

    1536:Irae78zjORCDGwfdCSog01313OQs5gcURDoq4OZZZLlCIibQwfclq8wJ:AahKyd2n31+Z5IRD68wbQbl4J

Malware Config

Extracted

Family

vidar

Version

4.3

Botnet

89433a6dbe159bb95b623839dcca3e27

C2

https://steamcommunity.com/profiles/76561199514261168

https://t.me/kamaprimo

Attributes
  • profile_id_v2

    89433a6dbe159bb95b623839dcca3e27

  • user_agent

    Mozilla/5.0 (Linux; U; Tizen 2.0; en-us) AppleWebKit/537.1 (KHTML, like Gecko) Mobile TizenBrowser/2.0

Targets

    • Target

      90c4d8c8f396f66d9b556ab05344a8cd.exe

    • Size

      93KB

    • MD5

      90c4d8c8f396f66d9b556ab05344a8cd

    • SHA1

      4869f0a7a3a68f4638556e9df0eef34ea0fdc9d7

    • SHA256

      6ba3d50f87b4c2c81a8ab9247f2fafa6f4ec31d1f3acffbdb40a83ab351df9be

    • SHA512

      4d5a61a89f6e003b92f093385bd56f5d798ac73c1cc524b261a3ff704d251ef1cb450177404651b072feab954c94f617a88bdb55620920ac620c2c115d6b960f

    • SSDEEP

      1536:Irae78zjORCDGwfdCSog01313OQs5gcURDoq4OZZZLlCIibQwfclq8wJ:AahKyd2n31+Z5IRD68wbQbl4J

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks