General

  • Target

    a1e9ac36f287a51c929becd38de41a536962e7f1c1ef3e954eeb5da0101bd7a3

  • Size

    117KB

  • Sample

    230713-yxvfqsbg6t

  • MD5

    10adfd55d2fe1b14553f911adc389e89

  • SHA1

    ea1a1861cf7fd3e100e54212976efa2ba998f2f6

  • SHA256

    a1e9ac36f287a51c929becd38de41a536962e7f1c1ef3e954eeb5da0101bd7a3

  • SHA512

    99443c2dc86d5e6a392f78ff244749e2769b4f160c0221bfb5c7de810ef7414ef071acefcdad3bc7a04df9d6f4b7731ae43c56faad69baf37c817ef501bc6a04

  • SSDEEP

    3072:ceImo5mf7mNlQw2+IvEuyrAAmU9JpdaNKNezb629Tf6O+BUnfvg0I0IM07V4Qr/c:ceGxMUbdqgw

Malware Config

Extracted

Family

vidar

Version

4.7

Botnet

https://t.me/eagl3z

C2

https://t.me/eagl3z

https://steamcommunity.com/profiles/76561199159550234

Attributes
  • profile_id_v2

    https://t.me/eagl3z

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1788.0 uacq

Targets

    • Target

      a1e9ac36f287a51c929becd38de41a536962e7f1c1ef3e954eeb5da0101bd7a3

    • Size

      117KB

    • MD5

      10adfd55d2fe1b14553f911adc389e89

    • SHA1

      ea1a1861cf7fd3e100e54212976efa2ba998f2f6

    • SHA256

      a1e9ac36f287a51c929becd38de41a536962e7f1c1ef3e954eeb5da0101bd7a3

    • SHA512

      99443c2dc86d5e6a392f78ff244749e2769b4f160c0221bfb5c7de810ef7414ef071acefcdad3bc7a04df9d6f4b7731ae43c56faad69baf37c817ef501bc6a04

    • SSDEEP

      3072:ceImo5mf7mNlQw2+IvEuyrAAmU9JpdaNKNezb629Tf6O+BUnfvg0I0IM07V4Qr/c:ceGxMUbdqgw

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks