General

  • Target

    sample

  • Size

    18KB

  • Sample

    240203-jgvn8sccd8

  • MD5

    c3ba1375694274633324d415de31e874

  • SHA1

    9cb98523c24d967f5b6fe967c9932d66472ebb73

  • SHA256

    7b57fc8247fcbb96a51179ee5f6ac33113b67fe891fc79af6fe68fec29968470

  • SHA512

    7fb6370260b9cb8daeebf97c619fd88d6fd8a4efc7e84b8793b452ffdd1f3f9c7fdb101832a2bd64ca9b6ab16b21ad54854bb3af51034a3f022c1cc781b15dee

  • SSDEEP

    384:rBlwDpmReVoOs4lN9ylKeGM9UbhhblFKeb7tN2weXlVJCBXQL:rBlwBVoOs4lryI1MehbjKeP6DJQQL

Malware Config

Extracted

Family

vidar

Version

7.6

Botnet

1b9d7ec5a25ab9d78c31777a0016a097

C2

https://t.me/tvrugrats

https://steamcommunity.com/profiles/76561199627279110

Attributes
  • profile_id_v2

    1b9d7ec5a25ab9d78c31777a0016a097

Targets

    • Target

      sample

    • Size

      18KB

    • MD5

      c3ba1375694274633324d415de31e874

    • SHA1

      9cb98523c24d967f5b6fe967c9932d66472ebb73

    • SHA256

      7b57fc8247fcbb96a51179ee5f6ac33113b67fe891fc79af6fe68fec29968470

    • SHA512

      7fb6370260b9cb8daeebf97c619fd88d6fd8a4efc7e84b8793b452ffdd1f3f9c7fdb101832a2bd64ca9b6ab16b21ad54854bb3af51034a3f022c1cc781b15dee

    • SSDEEP

      384:rBlwDpmReVoOs4lN9ylKeGM9UbhhblFKeb7tN2weXlVJCBXQL:rBlwBVoOs4lryI1MehbjKeP6DJQQL

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks