General

  • Target

    file.exe

  • Size

    2.0MB

  • Sample

    230823-13ch8afh73

  • MD5

    e128709bd0f63971fc54e23fbb03b556

  • SHA1

    50ecd6e8f46643a9d044db9c1daf227c496792e4

  • SHA256

    6befb001c108f7c45d2a391239785bd97cab9fd2a7ae579b724894827f11a443

  • SHA512

    7ad099acb32819879280ea78569309b571de62a3fff12d70aae684167e62c8190e2a34d8adf4d8ed44d6768e8bd466ab8d7eb08e62ae87c857272ba853dc2617

  • SSDEEP

    24576:qnB5rKkCqRA9TkDDTP0BmGJXIfGrcG3Ajimp:qnB5rKkCF9Tkry0Gr2p

Malware Config

Extracted

Family

vidar

Version

5.3

Botnet

974b0402eb06bfc59c13e30e8683b76c

C2

https://t.me/buukcay

https://steamcommunity.com/profiles/76561199544211655

Attributes
  • profile_id_v2

    974b0402eb06bfc59c13e30e8683b76c

Targets

    • Target

      file.exe

    • Size

      2.0MB

    • MD5

      e128709bd0f63971fc54e23fbb03b556

    • SHA1

      50ecd6e8f46643a9d044db9c1daf227c496792e4

    • SHA256

      6befb001c108f7c45d2a391239785bd97cab9fd2a7ae579b724894827f11a443

    • SHA512

      7ad099acb32819879280ea78569309b571de62a3fff12d70aae684167e62c8190e2a34d8adf4d8ed44d6768e8bd466ab8d7eb08e62ae87c857272ba853dc2617

    • SSDEEP

      24576:qnB5rKkCqRA9TkDDTP0BmGJXIfGrcG3Ajimp:qnB5rKkCF9Tkry0Gr2p

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses 2FA software files, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks