General

  • Target

    ce931df455e138dfdecac424fc81a767

  • Size

    660KB

  • Sample

    240316-vgyaxaha27

  • MD5

    ce931df455e138dfdecac424fc81a767

  • SHA1

    a0b165fcbf0e483e467cf0c0fc2668f9a2bfb47e

  • SHA256

    9e0e8cd747da5822b44db67d9c91200a0ef883aee8958f3e22e5bb165b40c576

  • SHA512

    41bedc153d31b2c2c12df243723c7d7efa957a8b0479d257723965160122c1ca673d3ff015b9a3c64db28701cfb472b9962e9ab56c1491f230e8a1614485bcc8

  • SSDEEP

    12288:c9lJWZEFcQBlWaabA+hEB/FCQlGYUT8nXbgjQVxZyRikUa/Pm+tOzl:2XDFzlWaSA+IdD6+gjmTy/E

Malware Config

Extracted

Family

vidar

Version

39.3

Botnet

399

C2

https://bandakere.tumblr.com/

Attributes
  • profile_id

    399

Targets

    • Target

      ce931df455e138dfdecac424fc81a767

    • Size

      660KB

    • MD5

      ce931df455e138dfdecac424fc81a767

    • SHA1

      a0b165fcbf0e483e467cf0c0fc2668f9a2bfb47e

    • SHA256

      9e0e8cd747da5822b44db67d9c91200a0ef883aee8958f3e22e5bb165b40c576

    • SHA512

      41bedc153d31b2c2c12df243723c7d7efa957a8b0479d257723965160122c1ca673d3ff015b9a3c64db28701cfb472b9962e9ab56c1491f230e8a1614485bcc8

    • SSDEEP

      12288:c9lJWZEFcQBlWaabA+hEB/FCQlGYUT8nXbgjQVxZyRikUa/Pm+tOzl:2XDFzlWaSA+IdD6+gjmTy/E

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks