General

  • Target

    b9ed4d14cadd11886b0f04e43.exe

  • Size

    128KB

  • Sample

    230709-vjypfsfe4y

  • MD5

    b9ed4d14cadd11886b0f04e43266ca4d

  • SHA1

    dba62307bb8cc9e5a285d3af1d2cf9836c3e85c3

  • SHA256

    2d95120a5cfba220550b69f8ef2ebd48e5f8681671204067715674219d4cdcc7

  • SHA512

    8aa941624cb61fad3fe0c396e6aa44ca7ff34e720746d4c0d5a904880a33706c80350edfc6edd052cce1f9d6b19c5f0fc562a6a4ed69751927ed50d49d0b588d

  • SSDEEP

    3072:5xTQPLm6fH6PP5McwLcfnzQ8b7e8s4Khb/Be+4TFkeCout:DTQv6PRM4Pp7eZ4ub/BGpkLoS

Malware Config

Extracted

Family

vidar

Version

4.2

Botnet

94aa71fd28602a425cfb539e40cc03dd

C2

https://steamcommunity.com/profiles/76561199511129510

https://t.me/rechnungsbetrag

Attributes
  • profile_id_v2

    94aa71fd28602a425cfb539e40cc03dd

  • user_agent

    Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.38 Safari/537.36 Brave/75

Targets

    • Target

      b9ed4d14cadd11886b0f04e43.exe

    • Size

      128KB

    • MD5

      b9ed4d14cadd11886b0f04e43266ca4d

    • SHA1

      dba62307bb8cc9e5a285d3af1d2cf9836c3e85c3

    • SHA256

      2d95120a5cfba220550b69f8ef2ebd48e5f8681671204067715674219d4cdcc7

    • SHA512

      8aa941624cb61fad3fe0c396e6aa44ca7ff34e720746d4c0d5a904880a33706c80350edfc6edd052cce1f9d6b19c5f0fc562a6a4ed69751927ed50d49d0b588d

    • SSDEEP

      3072:5xTQPLm6fH6PP5McwLcfnzQ8b7e8s4Khb/Be+4TFkeCout:DTQv6PRM4Pp7eZ4ub/BGpkLoS

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks