General

  • Target

    https://bit.ly/3P9yyzq

  • Sample

    240309-blh71abh2z

Malware Config

Extracted

Family

vidar

C2

http://5.182.86.94:80

https://t.me/vookihhfds

https://t.me/secgoxrp

https://steamcommunity.com/profiles/76561199568528949

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:110.0) Gecko/20100101 Firefox/121.0

Targets

    • Target

      https://bit.ly/3P9yyzq

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks