General

  • Target

    warezfromwg.7z

  • Size

    3.3MB

  • Sample

    230711-mrcg7ahe51

  • MD5

    dcdd76c490a1d765620d01918fec8101

  • SHA1

    42549d7c992bbba05769b4e913350a6491a23e88

  • SHA256

    a0549653170901aee47966438640490ded17b4d4e18d62f10847c10bbc5c9685

  • SHA512

    cd06c2e0e20ff63238d8d21ec579ac2ae400d93020533713fd4efaa178ad2fb9c185239cfc1a5e13d58e7115e7285c32149c9bd0cc2a32886d950eb5363493b7

  • SSDEEP

    49152:7sPDIP5ibhtSiRL1R7krqUI4FCKqyRWY4L2ft9ucDbt+PGGK8flYeCLpmnmlg1Pe:l5ibOiR/grlI4QSWYy4Ec6K8tsNkEg1G

Malware Config

Extracted

Family

vidar

Version

4.7

Botnet

https://t.me/eagl3z

C2

https://t.me/eagl3z

https://steamcommunity.com/profiles/76561199159550234

Attributes
  • profile_id_v2

    https://t.me/eagl3z

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1788.0 uacq

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    7ee57b1f6d4aff08f9755119b18cf0754b677addcb6a3063066112b10a357a8e

Targets

    • Target

      NFT Fest 2023 - Copy.exe

    • Size

      656.5MB

    • MD5

      b6e8aaba124ad4be2c806b4786bf1075

    • SHA1

      4d1e2ebaedab49d63d0f2d344d97e06cc68278e8

    • SHA256

      cc24bb9007373d1364a367d192c896510b4dcad4834b8dd66975a66c294d633f

    • SHA512

      2c4b88b3f4e1498efd4f4c2fcd434bb0e103704a4258e1cbb893ca1600477c6eae2a18803337f67fa4b2c61dc5f020aa1d016686c81dcffbcf2e43b06c6de7cd

    • SSDEEP

      98304:UkI7cHIBRQ75IIqIvjY/fYq0O42C2wn5FzJ:DHcQ7G1Iv0/fD0vPn5FN

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks