General

  • Target

    0db6c55f1cc3a007725efaac207f2a904435097a05260468c05559ec8cfdfd98

  • Size

    218KB

  • Sample

    240306-v4xmwsdg73

  • MD5

    d0cad5f509cc6d672b5f3f0ec1d6f644

  • SHA1

    81b55f806ce017997b45475b14bcd6f323d70c1f

  • SHA256

    0db6c55f1cc3a007725efaac207f2a904435097a05260468c05559ec8cfdfd98

  • SHA512

    6a8506c9dac07cb0ba421de933eb79aa33e6b8cc9ac1c950d25c07c2d22225ea5a22588b7da58111f581c7621af77384b389d6bf7fb5e74f7db083fa11a7548d

  • SSDEEP

    3072:0uMTUImQzMj/HT5jHsYN/sUXaQqlEEWkBJpT3lX1Nl3Z9k9x8vba/y+W/6xMGkGn:xMTUR/1UxfWoDlfloxwuW/6x5kG+

Malware Config

Extracted

Family

vidar

Version

8

Botnet

438c7562661d92141bb0adbe01c2fc5f

C2

https://steamcommunity.com/profiles/76561199644883218

https://t.me/neoschats

Attributes
  • profile_id_v2

    438c7562661d92141bb0adbe01c2fc5f

  • user_agent

    Mozilla/5.0 (Linux; Android 11; M2102J20SG) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/97.0.4692.99 Mobile Safari/537.36 EdgA/97.0.1072.78

Targets

    • Target

      0db6c55f1cc3a007725efaac207f2a904435097a05260468c05559ec8cfdfd98

    • Size

      218KB

    • MD5

      d0cad5f509cc6d672b5f3f0ec1d6f644

    • SHA1

      81b55f806ce017997b45475b14bcd6f323d70c1f

    • SHA256

      0db6c55f1cc3a007725efaac207f2a904435097a05260468c05559ec8cfdfd98

    • SHA512

      6a8506c9dac07cb0ba421de933eb79aa33e6b8cc9ac1c950d25c07c2d22225ea5a22588b7da58111f581c7621af77384b389d6bf7fb5e74f7db083fa11a7548d

    • SSDEEP

      3072:0uMTUImQzMj/HT5jHsYN/sUXaQqlEEWkBJpT3lX1Nl3Z9k9x8vba/y+W/6xMGkGn:xMTUR/1UxfWoDlfloxwuW/6x5kG+

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Detects Windows executables referencing non-Windows User-Agents

    • Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Tasks