General

  • Target

    cec96441b7aec3a25e12fb162f97dc95

  • Size

    694KB

  • Sample

    231222-r9xy3aeagk

  • MD5

    cec96441b7aec3a25e12fb162f97dc95

  • SHA1

    180e9f1be05cc240f518d8434cfba0b996529967

  • SHA256

    a31c163b94090364e2943cfb908a19964d35f429618c5b2a5bc2acfc4b6485cf

  • SHA512

    0336e4de1dc8ccba6e07e5ca89b9ff265cb94f0541103d3ed34b3867f57911ea4dcbae954dd679e39c04e08dcf31b33c1899a85f6b2e09e32cb91f0fbfa84aa5

  • SSDEEP

    12288:4UsXWCVB5WibBe6d4gnVM4QOEu4z9WhQZs7cIYpckrz85lx7ldXARUI9nk:4UYvwb6d434QTu4Js530wtTIUgn

Malware Config

Extracted

Family

vidar

Version

40.5

Botnet

706

C2

https://gheorghip.tumblr.com/

Attributes
  • profile_id

    706

Targets

    • Target

      cec96441b7aec3a25e12fb162f97dc95

    • Size

      694KB

    • MD5

      cec96441b7aec3a25e12fb162f97dc95

    • SHA1

      180e9f1be05cc240f518d8434cfba0b996529967

    • SHA256

      a31c163b94090364e2943cfb908a19964d35f429618c5b2a5bc2acfc4b6485cf

    • SHA512

      0336e4de1dc8ccba6e07e5ca89b9ff265cb94f0541103d3ed34b3867f57911ea4dcbae954dd679e39c04e08dcf31b33c1899a85f6b2e09e32cb91f0fbfa84aa5

    • SSDEEP

      12288:4UsXWCVB5WibBe6d4gnVM4QOEu4z9WhQZs7cIYpckrz85lx7ldXARUI9nk:4UYvwb6d434QTu4Js530wtTIUgn

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks